Tecno Camon 20 Pro
From Wiki-IoT
Classification
| Tecno Camon 20 Pro | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-30 |
| Information | |
| Name | Tecno Camon 20 Pro |
| Brand by Parent | Transsion by Transsion Holdings |
| Generation | 20 Series |
| Model(s) | Camon 20 Pro |
| Release date | 2022-12-27 |
| Type/Category | Smartphone |
| Website | [Tecno Mobile] |
| Status | In sale |
| More | |
| Dimensions | 158.6 x 73.7 x 8.0 mm |
| Mass | Approximately 185 grams |
| Operating system | Android 13 |
| Companion App | HiOS |
| CPU | MediaTek Helio G99 |
| GPU | Mali-G57 |
| Memory | 8GB RAM |
| Storage | 256GB |
| Battery | 5000mAh |
| Power | 5V/2A |
| Charging | Fast charging support |
| Display | 6.67-inch FHD+ AMOLED, resolution 2400 x 1080 |
| Camera | Rear: 64MP main + 2MP macro + 2MP depth Front: 32MP |
| Sound | Dual speakers, 3.5mm headphone jack |
| Connectivity | 4G LTE, Wi-Fi, Bluetooth 5.0, GPS |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [] | Minor incidents reported, generally secure. |
| Known vulnerabilities | None | [] | No significant vulnerabilities identified. |
| Prior attacks | Rare | [] | Few documented incidents, primarily targeted attacks. |
| Updatability | Very common | [] | Regular software updates are available. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [] | Supports OAuth and integrates with third-party services. |
| Communications | Encrypted with up-to-date encryption | [] | Utilizes TLS 1.3 for secure data transmission. |
| Storage | Encrypted with up-to-date encryption | [] | Data stored on the device is encrypted with AES-256. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [] | Supports multiple user accounts and permissions. |
| Authentication | Secure | [] | Utilizes encryption and secure protocols for login |
| Brute-force protection | Exist | [] | Implements mechanisms to limit login attempts. |
| Event logging | Access event logged | [] | Logs significant events for security monitoring. |
| Passwords | Require change after setup with complexity requirements | [] | Enforces strong password policies to enhance security. |
| Category score | 1 | ||
| Grade | A |
|---|