Vivo Pad 3
From Wiki-IoT
Classification
| Vivo Pad 3 | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-15 |
| Information | |
| Name | vivo Pad3 |
| Brand by Parent | vivo by vivo Communication Technology Co., Ltd. |
| Generation | Pad Series |
| Model(s) | |
| Release date | 2024-03-26 |
| Type/Category | Tablet |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 266.43 mm (Height) × 192 mm (Width) × 6.57 mm (Thickness) |
| Mass | 589.2 g |
| Operating system | OriginOS 4 (Tablet Custom System) |
| Companion App | V-Appstore, vivo Website, PC-level WPS, CAJViewer |
| CPU | Qualcomm Snapdragon 8s Gen 3 |
| GPU | Adreno 740 (as part of the Snapdragon 8s Gen 3 platform) |
| Memory | 8GB / 12GB LPDDR5X RAM |
| Storage | 128GB (UFS 3.1) / 256GB / 512GB (UFS 4.0) |
| Battery | 10000 mAh (Typical Value) |
| Power | |
| Charging | 44W Wired Flash Charge |
| Display | 12.1-inch LCD, 2.8K (2800x1968) Resolution, 144Hz Refresh Rate |
| Camera | Rear: 8MP; Front: 5MP |
| Sound | 6-speaker Panoramic Acoustic System |
| Connectivity | Wi-Fi (2.4G/5.1G/5.8G), Bluetooth 5.4, USB Type-C (USB 3.2 GEN1) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | As an official device from a major manufacturer, no widespread hardware tampering issues are reported for retail units. |
| Known vulnerabilities | Rare | [3] | Subject to general Android and chipset platform vulnerabilities. No widespread, model-specific exploits were prominent. |
| Prior attacks | Rare | [4] | Targeted attacks on specific tablet models are rare; general Android malware is the primary concern. |
| Updatability | Very common | [5] | As a modern device launched with OriginOS 4, it is expected to receive regular OS and security updates from vivo. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Supports seamless collaboration with other devices, including communication sharing for direct 5G connection from a phone and remote PC control . |
| Communications | Encrypted with up-to-date encryption | [7] | Supports modern Bluetooth 5.4 and Wi-Fi standards, which utilize contemporary, strong encryption protocols by default. |
| Storage | Encrypted with up-to-date encryption | [8] | As a modern Android-based device (OriginOS 4), it is expected to employ File-Based Encryption (FBE) by default. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Full vivo account system for device management, cloud services, and security settings. |
| Authentication | Secure | [] | Relies on standard Android/OriginOS authentication methods, including PIN, pattern, and password. The system integrates with the vivo account ecosystem for secure access . |
| Brute-force protection | Exist | [10] | The underlying Android platform includes mechanisms that impose time delays after multiple failed unlock attempts. |
| Event logging | Access event logged | [11] | The Android/OriginOS platform includes system-level logging of security and access events. |
| Passwords | Require change after setup | [12] | The initial device setup and vivo account creation guide users to set a personal password. |
| Category score | 2 | ||
| Grade | A- |
|---|