Xiaomi Redmi 2

From Wiki-IoT


Classification

Xiaomi Redmi 2
Classification
Grade A
Calculator version 1
Classification date 2024-10-31
Information
Name Redmi Phone 2
Brand by Parent Redmi by Xiaomi Corporation
Generation Red MI 2
Model(s) Mobile 4G, Telecom 4G, enhanced mobile 4G, Unicom 4G, Enhanced Unicom 4G, Enhanced Telecom 4G.
Release date 2015-01-09
Type/Category Smartphone
Website [1]
Status End of sale
More
Dimensions 134mm×67.2mm×9.4mm
Mass
Operating system MIUI 6 based on Android 4.4
Companion App Mi Home
CPU Qualcomm Snapdragon 410 quad-core processor, Adreno306 graphics processor, 1GB/2GB RAM, 8GB/16GB ROM, support for MicroSD card expansion (up to 32GB)
GPU Qualcomm Adreno306
Memory Redmi 2 Standard Edition runs on 1GB of RAM. The enhanced version comes with 2GB of running memory
Storage The Redmi 2 Standard edition has 8GB of internal storage, while the enhanced edition offers an even larger 16GB of storage
Battery 2200mAh removable battery
Power The Redmi 2 comes with a 2200mAh removable battery
Charging Support Quick charge 1.0 fast charge technology, you can charge the mobile phone in a short time
Display 1280x720 pixels, 312 pixels per inch
Camera Rear camera: 8 megapixel back camera with autofocus, LED flash, HDR, 1080p video recording. Front camera: 2 megapixels, supporting the second generation of smart beauty
Sound Integrated loudspeaker Integrated microphone
Connectivity 支持4G网络,双卡双待。 Wi-Fi:支持802.11 b/g/n(2.4GHz),提供稳定的无线网络连接。 蓝牙:支持蓝牙4.0,可以连接各种蓝牙设备。 USB:Micro USB接口,支持USB 2.0标准。 NFC:不支持NFC功能。 耳机插孔:3.5mm耳机插孔,兼容大多数耳机。
Device
Criterion Value Proof(s) Comment
Known hardware tampering Rare [2] Xiaomi received information about a security vulnerability in the ARM Mali GPU Driver
Known vulnerabilities None [3] Xiaomi received a Bluetooth mesh-related vulnerability from MTK
Prior attacks None [4] Xiaomi received multiple DSP cache overflow vulnerabilities reported by MTK
Updatability Rare [5] Xiaomi Cloud Service products have XSS vulnerabilities
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Full [6] Presumably has good authentication
Communications Encrypted with up-to-date encryption [7] Likely uses modern encryption
Storage Encrypted with up-to-date encryption [8] Probably encrypts storage for safety
Category score 1
User Authentication
Criterion Value Proof(s) Comment
Account management Full [9] There is a wide range of account management
Authentication Secure [10] There are a variety of authentication methods to ensure security
Brute-force protection Exist [11] There may be brute force protection
Event logging Access event logged [12] There are a number of security measures in place to ensure that logs are protected
Passwords Require change after setup with complexity requirements [13] Data is password protected
Category score 1
Grade A