Razer Viper Mini Signature Edition
From Wiki-IoT
Classification
| Razer Viper Mini Signature Edition | |
|---|---|
| Classification | |
| Grade | B |
| Calculator version | 1 |
| Classification date | 2025-10-08 |
| Information | |
| Name | Razer Viper Mini Signature Edition |
| Brand by Parent | Razer by Razer Inc. |
| Generation | Viper Mini |
| Model(s) | RZ01-04310 |
| Release date | 2023-03-02 |
| Type/Category | Gaming Mouse / Computer Peripheral |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 118.3 mm x 56.1 mm x 38.3 mm |
| Mass | 49 g (with dongle) |
| Operating system | Platform-dependent (Requires Windows 10/11, macOS 10.15 or later) |
| Companion App | Razer Synapse (Cloud-based) |
| CPU | Integrated Microcontroller (Specific model not publicly disclosed) |
| GPU | N/A |
| Memory | Embedded Memory for Profile Storage |
| Storage | N/A |
| Battery | N/A (Wired operation) / Optional HyperPolling Wireless Dongle has a battery |
| Power | USB-C |
| Charging | USB-C (for optional wireless dongle) |
| Display | N/A |
| Camera | N/A |
| Sound | N/A |
| Connectivity | Razer HyperSpeed Wireless (2.4 GHz) / USB-C Wired / Bluetooth (for dongle pairing) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [No credible public reports.] | As a high-end brand, Razer maintains strict supply chain control. No public cases of hardware-level backdoors exist for this product. |
| Known vulnerabilities | Rare | [No credible public reports.] | Vulnerabilities are primarily found in the Razer Synapse software, not the mouse firmware itself. No specific, critical vulnerabilities publicly reported for this exact model. |
| Prior attacks | Rare | [No credible public reports.] | No direct attacks reported for this specific model. Attacks typically involve abusing the macro functionality or exploiting the Synapse software, not the physical device directly. |
| Updatability | Very common | [2] | irmware and Razer Synapse software regularly receive updates over the internet for bug fixes and feature enhancements. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [3] | Authenticates securely with Razer's cloud services via Razer ID for settings synchronization. |
| Communications | Encrypted with up-to-date encryption | [4] | USB communication is inherently secure. Wireless connection uses proprietary encryption. |
| Storage | No encryption | [No credible public reports.] | Profile data stored locally on the mouse (DPI settings, button binds) is typically not encrypted. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [5] | Full account management (password reset, device linking) is provided through the Razer ID system. |
| Authentication | Basic | [No credible public reports.] | Primarily relies on "Username + Password" for Razer ID. Two-Factor Authentication (2FA) is available but not mandatory. |
| Brute-force protection | Exist | [No credible public reports.] | ccount lockout or CAPTCHA challenges are assumed after multiple failed login attempts, as is standard. |
| Event logging | Partial logging | [No credible public reports.] | Razer likely logs login events and software usage for diagnostics, but users cannot access comprehensive device-level access logs. |
| Passwords | Require change after setup | [No credible public reports.] | A complex password is required upon Razer account creation, but forced periodic password changes are not implemented. |
| Category score | 2 | ||
| Grade | B |
|---|