Tecno camon 30 pro
From Wiki-IoT
Classification
Tecno camon 30 pro | |
---|---|
Classification | |
Grade | A+ |
Calculator version | 1 |
Classification date | 2024-10-30 |
Information | |
Name | Tecno Camon 30 Pro |
Brand by Parent | Tecno by Transsion Holdings |
Generation | 30 Series |
Model(s) | Camon 30 Pro |
Release date | 2022-03-01 |
Type/Category | Smartphone |
Website | [Tecno Mobile] |
Status | In sale |
More | |
Dimensions | 164.57 x 76.95 x 8.8 mm |
Mass | Approximately 203 g |
Operating system | Android 12 |
Companion App | HiOS |
CPU | MediaTek Helio G95 |
GPU | Mali-G76 MC4 |
Memory | 8 GB RAM |
Storage | 256 GB |
Battery | 5000 mAh |
Power | Standard power management with optimizations for battery life |
Charging | 33W fast charging support |
Display | 6.8 inches IPS LCD, 1080 x 2460 pixels resolution, 120Hz refresh rate |
Camera | Rear Camera: Triple setup (64 MP main, 2 MP depth sensor, 0.08 MP AI lens) Front Camera: 32 MP |
Sound | Dual speakers, 3.5 mm headphone jack |
Connectivity | 4G LTE Wi-Fi 802.11 a/b/g/n/ac Bluetooth 5.0 GPS/GLONASS/Beidou USB Type-C 2.0 |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | None | [] | No reported hardware tampering. |
Known vulnerabilities | None | [] | No significant vulnerabilities found. |
Prior attacks | None | [] | No known attacks reported. |
Updatability | Very common | [] | Frequent updates expected. |
Category score | 1 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [] | Supports integration with various systems. |
Communications | Encrypted with up-to-date encryption | [] | Utilizes modern encryption standards. |
Storage | Encrypted with up-to-date encryption | [] | Data stored securely with current encryption methods. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [] | Comprehensive account management features |
Authentication | Secure | [] | Implements secure authentication methods. |
Brute-force protection | Exist | [] | Includes mechanisms to prevent brute-force attacks. |
Event logging | Access event logged | [] | Logs access events for monitoring. |
Passwords | Require change after setup with complexity requirements | [] | Strong password policies enforced. |
Category score | 1 |
Grade | A+ |
---|