Tecno Camon 30
From Wiki-IoT
Classification
Tecno Camon 30 | |
---|---|
Classification | |
Grade | A- |
Calculator version | 1 |
Classification date | 2024-10-30 |
Information | |
Name | Tecno Camon |
Brand by Parent | Transsion by Transsion Holdings |
Generation | Tecno Camon 30 |
Model(s) | Camon 18, Camon 19 |
Release date | 2021-04-14 |
Type/Category | Smartphone |
Website | [Tecno Mobile] |
Status | In sale |
More | |
Dimensions | 171.3 x 77.2 x 8.9 mm |
Mass | Camon 18 |
Operating system | Android |
Companion App | Tecno Mobile's HiOS |
CPU | MediaTek Helio G88 |
GPU | Mali-G52 |
Memory | RAM: 4GB / 6GB options |
Storage | Internal: 64GB / 128GB options (expandable via microSD) |
Battery | Capacity: 5000 mAh |
Power | Typical usage for more than a day |
Charging | Fast charging support (18W) |
Display | Size: 6.8 inches, HD+ (720 x 1640 pixels) Type: IPS LCD |
Camera | Rear: Triple camera setup (50 MP main + 2 MP depth + AI lens) Front: 32 MP |
Sound | Dual speakers |
Connectivity | 4G LTE, Wi-Fi, Bluetooth 5.0, GPS, USB Type-C |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [] | Generally, smartphones have measures to prevent tampering, but it can vary. |
Known vulnerabilities | Rare | [] | Newer models typically address vulnerabilities, but periodic updates are crucial. |
Prior attacks | None | [] | While any device can be targeted, Tecno models usually do not have significant histories of attacks. |
Updatability | Very common | [] | Tecno often provides software updates; check official sources for specifics. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Partial | [] | Supports some external authentication methods. |
Communications | Encrypted with up-to-date encryption | [] | Typically uses modern encryption standards for secure communications. |
Storage | Encrypted with up-to-date encryption | [] | Often employs strong encryption for data protection. Note |
Category score | 2 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [] | Comprehensive account management features available. |
Authentication | Secure | [] | Implements secure methods for user authentication. |
Brute-force protection | Exist | [] | Mechanisms in place to mitigate brute-force attacks. |
Event logging | Access event logged | [] | Logs access events for monitoring and security audits. |
Passwords | Require change after setup with complexity requirements | [] | Enforces complexity rules for passwords, enhancing security. |
Category score | 1 |
Grade | A- |
---|