SHOKZ OpenRun Pro Bone Conduction Headphones

From Wiki-IoT


Classification

SHOKZ OpenRun Pro Bone Conduction Headphones
Classification
Grade C
Calculator version 1
Classification date 2025-10-17
Information
Name SHOKZ OpenRun Pro
Brand by Parent SHOKZ by Shenzhen Voxtech Co., Ltd.
Generation
Model(s) S810
Release date 2022-03-10
Type/Category Earphone
Website [1]
Status In sale
More
Dimensions
Mass 29g
Operating system Proprietary Embedded System
Companion App SHOKZ App
CPU Proprietary Bluetooth Audio SoC
GPU
Memory
Storage
Battery Lithium-ion, approx. 10-hour battery life
Power Magnetic Charging
Charging Supports fast charging (5-minute charge for 90 minutes of use)
Display
Camera
Sound Bone Conduction Transducer with TurboPitch™ Acoustic Technology
Connectivity Bluetooth 5.1
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [] Risk of hardware tampering is very low for a well-known branded consumer electronic device.
Known vulnerabilities None [] No publicly disclosed specific vulnerabilities for this model. Its simple functionality presents a small attack surface.
Prior attacks None [] No publicly reported attack instances targeting this specific model.
Updatability Rare [] Firmware updates are available via the official SHOKZ App, but they are infrequent and typically for minor optimizations.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [] Connects to devices using standard Bluetooth pairing protocols.
Communications Encrypted with up-to-date encryption [] Bluetooth 5.1 connections are encrypted by default using modern standards (e.g., AES-CCM).
Storage No encryption [] The device itself has no user data storage functionality.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Absent [] The earphones themselves have no user account system. The companion app may involve basic device management.
Authentication Basic [] Physical power on/off. Bluetooth pairing is the primary "authentication" method.
Brute-force protection Absent [] The Bluetooth pairing process itself has no brute-force protection mechanism.
Event logging Absent [] The device itself has no user event logging capability.
Passwords Default/Common/Easy to guess [] Bluetooth pairing typically uses common PINs like "0000" or requires no PIN.
Category score 3
Grade C