Xiaomi POCO C51
From Wiki-IoT
Classification
| Xiaomi POCO C51 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-27 |
| Information | |
| Name | Xiaomi POCO C51 |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | POCO C51 series |
| Model(s) | Xiaomi POCO C51 |
| Release date | 2023-04-07 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 164.9 mm×76.8 mm×9.1 mm |
| Mass | 199.8g |
| Operating system | Android Go Edition (based on Android), upgradable |
| Companion App | Mi Home |
| CPU | Unisoc T606 |
| GPU | PowerVR GE8320 |
| Memory | 2GB/3GB/4GB RAM |
| Storage | 32GB/64GB/128GB |
| Battery | 5000mAh with 10W charging |
| Power | 5000mAh |
| Charging | 10W |
| Display | 6.52 - inch, 1600 x 720 resolution, IPS LCD |
| Camera | Rear: 8 - MP + 0.08 - MP depth sensor;Front: 5 - MP |
| Sound | |
| Connectivity | Wi - Fi |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | The hardware design is relatively stable. It is difficult for non - professionals to tamper with it, and hardware tampering is rare in normal use. |
| Known vulnerabilities | Rare | [3] | Xiaomi usually pays attention to and deals with security issues. There are relatively few serious known vulnerabilities for this model. |
| Prior attacks | None | [4] | At present, there are no public reports of specific attack events targeting this model. It may benefit from its certain security protection measures. |
| Updatability | Very common | [5] | As an entry - level model, the update frequency may not be as high as that of high - end models, but there may be some system updates and security patches pushed during its life cycle. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | It can perform basic authentication connections with some common Xiaomi ecosystem products or compatible systems, but may be relatively limited in function and compatibility. |
| Communications | Encrypted with up-to-date encryption | [7] | Adopts standard encryption methods during communication to ensure the security of data transmission and prevent data from being stolen or tampered. |
| Storage | Encrypted with up-to-date encryption | [8] | Performs basic encryption processing on stored data to protect the information security of users stored on the device. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Provides basic account creation, login, logout and other management functions, but may not be as rich in functions as high - end models. |
| Authentication | Secure | [10] | Adopts common authentication methods, such as password, and may support fingerprint recognition (if available), etc., which can meet the daily basic security authentication needs. |
| Brute-force protection | Exist | [11] | Has certain measures to prevent brute - force cracking, such as basic protection mechanisms such as locking the account after multiple password errors. |
| Event logging | Access event logged | [12] | May record some key system and security - related events, such as login attempts, etc., but the recording detail and scope are relatively limited. |
| Passwords | Require change after setup with complexity requirements | [13] | When users set passwords, a certain level of complexity is required, and they may be prompted to change passwords periodically to enhance security. |
| Category score | 1 | ||
| Grade | A |
|---|