Xiaomi 13
From Wiki-IoT
Classification
| Xiaomi 13 | |
|---|---|
| Classification | |
| Grade | A+ |
| Calculator version | 1 |
| Classification date | 2024-10-31 |
| Information | |
| Name | Xiaomi 13 |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | 13th generation |
| Model(s) | Xiaomi 13, Xiaomi 13 Pro, Xiaomi 13 Lite, etc. |
| Release date | 2022-12-11 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of sale |
| More | |
| Dimensions | 152.8 x 71.5 x 8.0 mm |
| Mass | 189 g |
| Operating system | MIUI 14 (based on Android 13) |
| Companion App | MIUI |
| CPU | Qualcomm Snapdragon 8 Gen 2 |
| GPU | Adreno 740 |
| Memory | 8 GB / 12 GB LPDDR5X RAM |
| Storage | 128 GB / 256 GB / 512 GB UFS 3.1 |
| Battery | 4,500 mAh |
| Power | 67W wired charging, 50W wireless charging, 10W reverse wireless charging |
| Charging | Fast charging with a compatible charger included |
| Display | 6.36-inch AMOLED, 2400 x 1080 pixels, 120 Hz refresh rate |
| Camera | Rear: 50 MP (main) + 12 MP (ultra-wide) + 10 MP (telephoto) Front: 32 MP |
| Sound | Stereo speakers, no 3.5mm headphone jack |
| Connectivity | 5G, Wi-Fi 6E, Bluetooth 5.3, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | |
| Known vulnerabilities | None | [3] | |
| Prior attacks | None | [4] | |
| Updatability | Very common | [5] | |
| Category score | 1 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Supports OAuth and other protocols |
| Communications | Encrypted with up-to-date encryption | [7] | Uses TLS/SSL for secure connections |
| Storage | Encrypted with up-to-date encryption | [8] | Supports full disk encryption |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Comprehensive account settings available |
| Authentication | Secure | [10] | Supports biometric and secure PIN options |
| Brute-force protection | Exist | [11] | Includes lockout mechanisms after failed attempts |
| Event logging | Access event logged | [12] | Logs access events for security monitoring |
| Passwords | Require change after setup with complexity requirements | [13] | Enforces strong password policies |
| Category score | 1 | ||
| Grade | A+ |
|---|