Xiaomi Mi 12T

From Wiki-IoT


Classification

Xiaomi Mi 12T
Classification
Grade A
Calculator version 1
Classification date 2024-10-31
Information
Name Xiaomi 12T
Brand by Parent Xiaomi by Xiaomi Corporation
Generation Xiaomi 12T series
Model(s) Xiaomi 12T
Release date 2022-10-06
Type/Category Smartphone
Website [1]
Status In sale
More
Dimensions 163.1 mm x 75.9 mm x 8.6 mm
Mass 202 g
Operating system Android 12, upgradable to Android 14, MIUI 14
Companion App Mi Home
CPU MediaTek Dimensity 8100 Ultra (5 nm)
GPU Mali-G610 MC6
Memory 128GB 8GB RAM, 256GB 8GB RAM
Storage UFS 3.1
Battery Li-Po 5000 mAh, non-removable
Power 5000mAh
Charging 120W wired, 100% in 19 min (advertised)
Display 6.67 inches AMOLED, 1220 x 2712 pixels, 120Hz refresh rate
Camera Triple rear (108 MP, 8 MP, 2 MP), Single front (20 MP)
Sound Stereo speakers, no 3.5mm headphone jack
Connectivity Wi-Fi 802.11 a/b/g/n/ac/6, dual-band, Bluetooth 5.3, A2DP, LE, GPS, GLONASS, BDS, GALILEO, QZSS, NavIC, NFC (market/region dependent), Infrared port
Device
Criterion Value Proof(s) Comment
Known hardware tampering Rare [2] Given Xiaomi's manufacturing quality, hardware tampering is likely to be uncommon.
Known vulnerabilities Rare [3] Xiaomi usually addresses security issues promptly, so known vulnerabilities for this model are likely to be few.
Prior attacks None [4] As of now, there are no known prior attacks on this device.
Updatability Very common [5] As a mid-range model, it is expected to receive some system updates and security patches.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Full [6] Likely has basic authentication for connecting with other Xiaomi ecosystem products.
Communications Encrypted with up-to-date encryption [7] Probably uses standard encryption for communication.
Storage Encrypted with up-to-date encryption [8] Encrypts stored data to a certain extent.
Category score 1
User Authentication
Criterion Value Proof(s) Comment
Account management Full [9] Offers basic account management functions.
Authentication Secure [10] Uses common authentication methods for security.
Brute-force protection Exist [11] Has some measures to prevent brute-force attacks.
Event logging Access event logged [12] May log some key events for security and troubleshooting.
Passwords Require change after setup with complexity requirements [13] Requires passwords with some complexity and may prompt for changes.
Category score 1
Grade A