Samsung Galaxy Note 20 Ultra
From Wiki-IoT
Classification
| Samsung Galaxy Note 20 Ultra | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-16 |
| Information | |
| Name | Samsung Galaxy Note 20 Ultra |
| Brand by Parent | Samsung by Samsung |
| Generation | 20th generation |
| Model(s) | SM - N986B |
| Release date | 2020-08-05 |
| Type/Category | Smart phone |
| Website | [www.samsung.com] |
| Status | End of sale |
| More | |
| Dimensions | 164.8 × 77.2 × 8.1 mm |
| Mass | 208 g |
| Operating system | Android 10 |
| Companion App | Samsung Notes, Galaxy Wearable |
| CPU | Snapdragon 865+ (7nm+) / Exynos 990 (7nm+) |
| GPU | Adreno 650 (Snapdragon) / Mali-G77 MP11 (Exynos) |
| Memory | 12GB |
| Storage | 128GB / 256GB / 512GB (microSDXC support) |
| Battery | 4500mAh |
| Power | ~17.3Wh |
| Charging | 25W wired fast charging, 15W wireless charging, 4.5W reverse wireless charging |
| Display | 3088 × 1440, Dynamic AMOLED 2X, 120Hz adaptive refresh rate |
| Camera | 108MP wide-angle camera (OIS, laser AF) + 12MP periscope telephoto camera (5x optical zoom, 50x hybrid zoom, OIS) + 12MP ultra-wide camera + 10MP front camera (Dual Pixel AF) |
| Sound | Stereo speakers tuned by AKG, support for AAC, MP3, FLAC, etc. |
| Connectivity | 5G / 4G LTE; Wi-Fi 6; Bluetooth 5.0; NFC; UWB; IP68 water and dust resistance; DeX support |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [1] | Samsung's Knox security platform is built into the hardware, providing strong protection against physical tampering and making such events extremely rare. |
| Known vulnerabilities | Very common | [2] | As a high-profile flagship device, it is a constant subject of security research, which means vulnerabilities are discovered and patched regularly. This is a sign of a healthy ecosystem. |
| Prior attacks | Very common | [3] | The Android OS is the world's most targeted mobile platform for malware and phishing, making the threat of attacks on any Android device very common. |
| Updatability | Very common | [4] | During its support window, the device received timely and frequent security and OS updates. Note: Official update support has now ended. |
| Category score | 3 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [5] | Supports all modern authentication standards required for secure integration with external apps, services, and enterprise systems. |
| Communications | Encrypted with up-to-date encryption | [6] | Network traffic is secured using the latest standards of its time, including WPA3 for Wi-Fi and TLS 1.3 for secure web browsing. |
| Storage | Encrypted with up-to-date encryption | [7] | Device storage is encrypted by default using strong cryptographic algorithms (File-Based Encryption) to protect user data at rest. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [8] | The OS provides a complete set of tools to add, remove, and manage permissions for multiple user accounts (e.g., Google, Samsung, Exchange). |
| Authentication | Secure | [9] | It features strong, hardware-backed authentication methods, including an ultrasonic in-display fingerprint scanner and facial recognition. |
| Brute-force protection | Exist | [10] | The system enforces a time-based lockout after a set number of incorrect password/PIN attempts to protect against brute-force attacks. |
| Event logging | Access event logged | [11] | Associated cloud accounts (Google/Samsung) provide a detailed security dashboard, logging all significant events like new sign-ins for user review. |
| Passwords | Require change after setup with complexity requirements | [12] | During initial setup, the user is required to create a screen lock (PIN, password, or pattern) that meets the OS's minimum complexity rules. |
| Category score | 1 | ||
| Grade | A- |
|---|