Xiaomi POCO C51

From Wiki-IoT


Classification

Xiaomi POCO C51
Classification
Grade A
Calculator version 1
Classification date 2024-10-27
Information
Name Xiaomi POCO C51
Brand by Parent Xiaomi by Xiaomi Corporation
Generation POCO C51 series
Model(s) Xiaomi POCO C51
Release date 2023-04-07
Type/Category Smartphone
Website [1]
Status In sale
More
Dimensions 164.9 mm×76.8 mm×9.1 mm
Mass 199.8g
Operating system Android Go Edition (based on Android), upgradable
Companion App Mi Home
CPU Unisoc T606
GPU PowerVR GE8320
Memory 2GB/3GB/4GB RAM
Storage 32GB/64GB/128GB
Battery 5000mAh with 10W charging
Power 5000mAh
Charging 10W
Display 6.52 - inch, 1600 x 720 resolution, IPS LCD
Camera Rear: 8 - MP + 0.08 - MP depth sensor;Front: 5 - MP
Sound
Connectivity Wi - Fi
Device
Criterion Value Proof(s) Comment
Known hardware tampering Rare [2] The hardware design is relatively stable. It is difficult for non - professionals to tamper with it, and hardware tampering is rare in normal use.
Known vulnerabilities Rare [3] Xiaomi usually pays attention to and deals with security issues. There are relatively few serious known vulnerabilities for this model.
Prior attacks None [4] At present, there are no public reports of specific attack events targeting this model. It may benefit from its certain security protection measures.
Updatability Very common [5] As an entry - level model, the update frequency may not be as high as that of high - end models, but there may be some system updates and security patches pushed during its life cycle.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Full [6] It can perform basic authentication connections with some common Xiaomi ecosystem products or compatible systems, but may be relatively limited in function and compatibility.
Communications Encrypted with up-to-date encryption [7] Adopts standard encryption methods during communication to ensure the security of data transmission and prevent data from being stolen or tampered.
Storage Encrypted with up-to-date encryption [8] Performs basic encryption processing on stored data to protect the information security of users stored on the device.
Category score 1
User Authentication
Criterion Value Proof(s) Comment
Account management Full [9] Provides basic account creation, login, logout and other management functions, but may not be as rich in functions as high - end models.
Authentication Secure [10] Adopts common authentication methods, such as password, and may support fingerprint recognition (if available), etc., which can meet the daily basic security authentication needs.
Brute-force protection Exist [11] Has certain measures to prevent brute - force cracking, such as basic protection mechanisms such as locking the account after multiple password errors.
Event logging Access event logged [12] May record some key system and security - related events, such as login attempts, etc., but the recording detail and scope are relatively limited.
Passwords Require change after setup with complexity requirements [13] When users set passwords, a certain level of complexity is required, and they may be prompted to change passwords periodically to enhance security.
Category score 1
Grade A