Tecno Camon 30

From Wiki-IoT


Classification

Tecno Camon 30
Classification
Grade A-
Calculator version 1
Classification date 2024-10-30
Information
Name Tecno Camon
Brand by Parent Transsion by Transsion Holdings
Generation Tecno Camon 30
Model(s) Camon 18, Camon 19
Release date 2021-04-14
Type/Category Smartphone
Website [Tecno Mobile]
Status In sale
More
Dimensions 171.3 x 77.2 x 8.9 mm
Mass Camon 18
Operating system Android
Companion App Tecno Mobile's HiOS
CPU MediaTek Helio G88
GPU Mali-G52
Memory RAM: 4GB / 6GB options
Storage Internal: 64GB / 128GB options (expandable via microSD)
Battery Capacity: 5000 mAh
Power Typical usage for more than a day
Charging Fast charging support (18W)
Display Size: 6.8 inches, HD+ (720 x 1640 pixels) Type: IPS LCD
Camera Rear: Triple camera setup (50 MP main + 2 MP depth + AI lens) Front: 32 MP
Sound Dual speakers
Connectivity 4G LTE, Wi-Fi, Bluetooth 5.0, GPS, USB Type-C
Device
Criterion Value Proof(s) Comment
Known hardware tampering Rare [] Generally, smartphones have measures to prevent tampering, but it can vary.
Known vulnerabilities Rare [] Newer models typically address vulnerabilities, but periodic updates are crucial.
Prior attacks None [] While any device can be targeted, Tecno models usually do not have significant histories of attacks.
Updatability Very common [] Tecno often provides software updates; check official sources for specifics.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [] Supports some external authentication methods.
Communications Encrypted with up-to-date encryption [] Typically uses modern encryption standards for secure communications.
Storage Encrypted with up-to-date encryption [] Often employs strong encryption for data protection. Note
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Full [] Comprehensive account management features available.
Authentication Secure [] Implements secure methods for user authentication.
Brute-force protection Exist [] Mechanisms in place to mitigate brute-force attacks.
Event logging Access event logged [] Logs access events for monitoring and security audits.
Passwords Require change after setup with complexity requirements [] Enforces complexity rules for passwords, enhancing security.
Category score 1
Grade A-