OnePlus 10
From Wiki-IoT
Classification
| OnePlus 10 | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-15 |
| Information | |
| Name | OnePlus 10 (5G) |
| Brand by Parent | OnePlus by OPPO Guangdong Mobile Telecommunications Corp., Ltd. |
| Generation | 10th generation |
| Model(s) | OnePlus 10 |
| Release date | 2022-01-11 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of sale |
| More | |
| Dimensions | 163.0 mm × 73.9 mm × 8.1 mm |
| Mass | 183 g |
| Operating system | ColorOS 12 (based on Android 12) |
| Companion App | HeyTap |
| CPU | Qualcomm Snapdragon 8 Gen 1 |
| GPU | Adreno 730 |
| Memory | 8GB/12GB |
| Storage | 128GB/256GB |
| Battery | 4500 mAh |
| Power | Wired charging supported |
| Charging | 65W wired fast charging |
| Display | 6.7-inch AMOLED, 2400×1080 resolution |
| Camera | Triple rear: 48MP + 50MP + 8MP; Front: 32MP |
| Sound | Stereo speakers |
| Connectivity | 5G, 4G LTE, Wi-Fi 6, Bluetooth 5.2, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Hardware tampering is relatively rare for mainstream consumer smartphones like OnePlus 10. |
| Known vulnerabilities | Rare | [3] | Vulnerabilities are managed via regular updates; not "very common". |
| Prior attacks | Rare | [4] | Publicly documented direct attacks on OnePlus 10 are uncommon. |
| Updatability | Very common | [5] | OnePlus provides frequent software updates for the device. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Supports full authentication with Bluetooth, Wi-Fi, and other systems. |
| Communications | Encrypted with up-to-date encryption | [7] | Uses modern encryption (e.g., 5G ciphering, Bluetooth 5.2 encryption). |
| Storage | Encrypted with up-to-date encryption | [8] | Leverages Android’s up-to-date disk encryption standards. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Enables full account management for device sync, cloud storage, and security settings. |
| Authentication | Secure | [10] | Uses secure methods (fingerprint, facial recognition, encrypted passwords). |
| Brute-force protection | Exist | [11] | Limits login attempts and uses secure storage to fend off brute-force attacks. |
| Event logging | Partial logging | [12] | Logs partial user access events (e.g., login tries, account modifications). |
| Passwords | Require change after setup with complexity requirements | [13] | Needs a complex password (with length/character rules) during setup and suggests regular changes. |
| Category score | 2 | ||
| Grade | A- |
|---|