Xiaomi POCO X6 Neo 5G
From Wiki-IoT
Classification
| Xiaomi POCO X6 Neo 5G | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-27 |
| Information | |
| Name | POCO X6 Neo 5G |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | POCO X6 Neo 5G series |
| Model(s) | POCO X6 Neo 5G |
| Release date | 2024-03-13 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 161.1 x 75 x 7.7 mm (6.34 x 2.95 x 0.30 in) |
| Mass | 175 g (6.17 oz) |
| Operating system | Android 13 |
| Companion App | Mi Home |
| CPU | Mediatek Dimensity 6080 (6 nm) |
| GPU | Mali-G57 MC2 |
| Memory | 128GB 8GB RAM, 256GB 12GB RAM |
| Storage | UFS 2.2 |
| Battery | 5000mAh, Li-Po, non-removable |
| Power | 5000mAh |
| Charging | 33W wired |
| Display | 6.67 inches AMOLED, 1080 x 2400 pixels, 120Hz refresh rate |
| Camera | Dual rear (108 MP, f/1.8, (wide), 0.64µm, PDAF + 2 MP, f/2.4, (depth)), Single front (16 MP, (wide)) |
| Sound | with stereo speakers, 3.5mm headphone jack |
| Connectivity | Wi-Fi 802.11 a/b/g/n/ac, dual-band, Bluetooth 5.3, A2DP, LE, GPS, GLONASS, GALILEO, BDS, NFC (market/region dependent), USB Type-C 2.0, OTG |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Given Xiaomi's manufacturing quality, hardware tampering is likely to be uncommon. |
| Known vulnerabilities | Rare | [3] | Xiaomi usually addresses security issues promptly, so known vulnerabilities for this model are likely to be few. |
| Prior attacks | None | [4] | As of now, there are no known prior attacks on this device. |
| Updatability | Very common | [5] | As a mid-range model, it is expected to receive some system updates and security patches. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Likely has basic authentication for connecting with other Xiaomi ecosystem products. |
| Communications | Encrypted with up-to-date encryption | [7] | Probably uses standard encryption for communication. |
| Storage | Encrypted with up-to-date encryption | [8] | Encrypts stored data to a certain extent. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Offers basic account management functions. |
| Authentication | Secure | [10] | Uses common authentication methods for security. |
| Brute-force protection | Exist | [11] | Has some measures to prevent brute-force attacks. |
| Event logging | Access event logged | [12] | May log some key events for security and troubleshooting. |
| Passwords | Require change after setup with complexity requirements | [13] | Requires passwords with some complexity and may prompt for changes. |
| Category score | 1 | ||
| Grade | A |
|---|