SHOKZ OpenFit 2

From Wiki-IoT


Classification

SHOKZ OpenFit 2
Classification
Grade C
Calculator version 1
Classification date 2025-10-16
Information
Name SHOKZ OpenFit2
Brand by Parent SHOKZ by Shenzhen Voxtech Co., Ltd.
Generation Second Generation
Model(s)
Release date 2025-01-10
Type/Category Earphone
Website [1]
Status
More
Dimensions
Mass Approx. 6.5g per earbud, approx. 48.5g for charging case
Operating system Proprietary Embedded System
Companion App SHOKZ App
CPU Proprietary Bluetooth Audio SoC
GPU
Memory
Storage
Battery Approx. 9 hours per charge, approx. 39 hours total (with charging case)
Power USB-C Charging (Charging Case), supports Wireless Charging
Charging Supports fast charging (10-minute charge for 3 hours of use)
Display
Camera
Sound New custom dynamic driver, Acoustic Beamforming Technology
Connectivity Bluetooth 5.3
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [] Risk of hardware tampering is very low for a well-known branded consumer electronic device.
Known vulnerabilities None [] No publicly disclosed specific vulnerabilities for this model.
Prior attacks None [] No publicly reported attack instances targeting this specific model.
Updatability Rare [] Firmware updates are available via the official SHOKZ App, but they are infrequent.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [] Connects to devices using standard Bluetooth pairing protocols. Supports multi-point connection.
Communications Encrypted with up-to-date encryption [] Bluetooth 5.3 connections are encrypted by default using modern standards.
Storage No encryption [] The device itself has no user data storage functionality.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Basic [] The earbuds themselves have no user account system, but the companion app may involve basic account management for device registration or support.
Authentication Basic [] Open-case pairing. Bluetooth pairing is the primary "authentication" method.
Brute-force protection Absent [] The Bluetooth pairing process itself has no brute-force protection mechanism.
Event logging Absent [] The device itself has no user event logging capability.
Passwords Default/Common/Easy to guess [] Bluetooth pairing typically uses common PINs or requires no PIN.
Category score 3
Grade C