Xiaomi POCO C55
From Wiki-IoT
Classification
| Xiaomi POCO C55 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-27 |
| Information | |
| Name | POCO C55 |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | POCO C55 series |
| Model(s) | POCO C55 |
| Release date | 2024-01-04 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 168.76mm*76.41mm*8.7mm |
| Mass | 192g |
| Operating system | Android 13 |
| Companion App | Mi Home |
| CPU | MediaTek Helio G85 (12 nm) |
| GPU | Mali-G52 MC2 |
| Memory | 64GB 6GB RAM, 128GB 6GB RAM, 128GB 8GB RAM |
| Storage | UFS 2.2, expandable via microSD |
| Battery | 5000mAh, Li-Po, non-removable |
| Power | 5000mAh |
| Charging | 18W wired |
| Display | 6.71 inches IPS LCD, 720 x 1650 pixels, 90Hz refresh rate |
| Camera | Triple rear (50 MP, f/1.8, (wide), 2 MP, f/2.4, (macro), 2 MP, f/2.4, (depth)), Single front (8 MP, f/2.0) |
| Sound | with stereo speakers, 3.5mm headphone jack |
| Connectivity | Wi-Fi 802.11 a/b/g/n/ac, dual-band, Bluetooth 5.3, A2DP, LE, GPS, GLONASS, BDS, GALILEO, NFC (market/region dependent), USB Type-C 2.0, OTG |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Given Xiaomi's manufacturing quality, hardware tampering is likely to be uncommon. |
| Known vulnerabilities | Rare | [3] | Xiaomi usually addresses security issues promptly, so known vulnerabilities for this model are likely to be few. |
| Prior attacks | None | [4] | As of now, there are no known prior attacks on this device. |
| Updatability | Very common | [5] | As a mid-range model, it is expected to receive some system updates and security patches. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Likely has basic authentication for connecting with other Xiaomi ecosystem products. |
| Communications | Encrypted with up-to-date encryption | [7] | Probably uses standard encryption for communication. |
| Storage | Encrypted with up-to-date encryption | [8] | Encrypts stored data to a certain extent. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Offers basic account management functions. |
| Authentication | Secure | [10] | Uses common authentication methods for security. |
| Brute-force protection | Exist | [11] | Has some measures to prevent brute-force attacks. |
| Event logging | Access event logged | [12] | May log some key events for security and troubleshooting. |
| Passwords | Require change after setup with complexity requirements | [13] | Requires passwords with some complexity and may prompt for changes. |
| Category score | 1 | ||
| Grade | A |
|---|