Xiaomi POCO C65
From Wiki-IoT
Classification
Xiaomi POCO C65 | |
---|---|
Classification | |
Grade | A |
Calculator version | 1 |
Classification date | 2024-10-27 |
Information | |
Name | Xiaomi POCO C65 |
Brand by Parent | Xiaomi by Xiaomi Corporation |
Generation | POCO C65 series |
Model(s) | Xiaomi POCO C65 |
Release date | 2023-11-06 |
Type/Category | Smartphone |
Website | [1] |
Status | In sale |
More | |
Dimensions | 168mm x 78mm x 8.09mm |
Mass | 192g |
Operating system | Android 13 with MIUI 14 for POCO |
Companion App | Mi Home |
CPU | MediaTek Helio G85 |
GPU | Mali-G52 MC2 |
Memory | 6GB/8GB RAM |
Storage | 128GB/256GB eMMC 5.1, expandable via microSD |
Battery | 5000mAh, Li-Po, non-removable |
Power | 5000mAh |
Charging | Supports 18W wired charging, PD |
Display | 6.74 inches IPS LCD, 1600x720 pixels, 90Hz refresh rate, Corning Gorilla Glass |
Camera | Rear: 50MP main + 2MP macro; Front: 8MP |
Sound | 3.5mm headphone jack, supports FM radio |
Connectivity | Bluetooth 5.3, Wi-Fi 802.11 a/b/g/n/ac, dual-band, GPS, GLONASS, GALILEO, BDS, NFC (market/region dependent), USB Type-C 2.0 |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [2] | Given Xiaomi's hardware design and manufacturing practices, hardware tampering is expected to be relatively rare. |
Known vulnerabilities | Rare | [3] | Xiaomi typically addresses security issues promptly, so the number of known vulnerabilities for this model is likely to be small. |
Prior attacks | None | [4] | As of now, there are no known prior attacks on this device, likely due to its security measures. |
Updatability | Very common | [5] | As an entry-level to mid-range model, it is expected to receive some system updates and security patches during its lifecycle. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [6] | Likely to have basic authentication for connecting with other Xiaomi ecosystem products or compatible systems. |
Communications | Encrypted with up-to-date encryption | [7] | Probably uses standard encryption methods for communication to protect data transmission. |
Storage | Encrypted with up-to-date encryption | [8] | Encrypts stored data to a basic extent for security. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [9] | Offers basic account management functions like creating, deleting, and changing passwords. |
Authentication | Secure | [10] | Uses common authentication methods to provide basic security. |
Brute-force protection | Exist | [11] | Has some measures to prevent brute-force attacks. |
Event logging | Access event logged | [12] | May log some key events for security and troubleshooting purposes. |
Passwords | Require change after setup with complexity requirements | [13] | May log some key events for security and troubleshooting purposes. |
Category score | 1 |
Grade | A |
---|