Tecno Camon 30
From Wiki-IoT
Classification
| Tecno Camon 30 | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2024-10-30 |
| Information | |
| Name | Tecno Camon |
| Brand by Parent | Transsion by Transsion Holdings |
| Generation | Tecno Camon 30 |
| Model(s) | Camon 18, Camon 19 |
| Release date | 2021-04-14 |
| Type/Category | Smartphone |
| Website | [Tecno Mobile] |
| Status | In sale |
| More | |
| Dimensions | 171.3 x 77.2 x 8.9 mm |
| Mass | Camon 18 |
| Operating system | Android |
| Companion App | Tecno Mobile's HiOS |
| CPU | MediaTek Helio G88 |
| GPU | Mali-G52 |
| Memory | RAM: 4GB / 6GB options |
| Storage | Internal: 64GB / 128GB options (expandable via microSD) |
| Battery | Capacity: 5000 mAh |
| Power | Typical usage for more than a day |
| Charging | Fast charging support (18W) |
| Display | Size: 6.8 inches, HD+ (720 x 1640 pixels) Type: IPS LCD |
| Camera | Rear: Triple camera setup (50 MP main + 2 MP depth + AI lens) Front: 32 MP |
| Sound | Dual speakers |
| Connectivity | 4G LTE, Wi-Fi, Bluetooth 5.0, GPS, USB Type-C |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [] | Generally, smartphones have measures to prevent tampering, but it can vary. |
| Known vulnerabilities | Rare | [] | Newer models typically address vulnerabilities, but periodic updates are crucial. |
| Prior attacks | None | [] | While any device can be targeted, Tecno models usually do not have significant histories of attacks. |
| Updatability | Very common | [] | Tecno often provides software updates; check official sources for specifics. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Partial | [] | Supports some external authentication methods. |
| Communications | Encrypted with up-to-date encryption | [] | Typically uses modern encryption standards for secure communications. |
| Storage | Encrypted with up-to-date encryption | [] | Often employs strong encryption for data protection. Note |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [] | Comprehensive account management features available. |
| Authentication | Secure | [] | Implements secure methods for user authentication. |
| Brute-force protection | Exist | [] | Mechanisms in place to mitigate brute-force attacks. |
| Event logging | Access event logged | [] | Logs access events for monitoring and security audits. |
| Passwords | Require change after setup with complexity requirements | [] | Enforces complexity rules for passwords, enhancing security. |
| Category score | 1 | ||
| Grade | A- |
|---|