Xiaomi Redmi K30
From Wiki-IoT
Classification
| Xiaomi Redmi K30 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-31 |
| Information | |
| Name | Redmi K30 |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | K30 series |
| Model(s) | Redmi K30 |
| Release date | 2019-12-10 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of sale |
| More | |
| Dimensions | 165.3 mm×76.6 mm×8.79 mm |
| Mass | 208g |
| Operating system | MIUI (based on Android 10) initially, upgradable |
| Companion App | Mi Home |
| CPU | Qualcomm Snapdragon 730G |
| GPU | Adreno 618 |
| Memory | 6GB/8GB RAM |
| Storage | 64GB/128GB/256GB |
| Battery | 4500mAh with 27W fast charging |
| Power | 4500mAh |
| Charging | 27W |
| Display | 6.67 - inch, 2400 x 1080 resolution, IPS LCD |
| Camera | Rear: 64 - MP + 8 - MP + 2 - MP + 2 - MP |
| Sound | |
| Connectivity | Wi - Fi 802.11 a/b/g/n/ac, Bluetooth 5.1, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Hardware design is relatively stable. Unauthorized modification is not common due to solid construction. |
| Known vulnerabilities | Rare | [3] | Xiaomi addresses security issues. Few known vulnerabilities exist with regular |
| Prior attacks | None | [4] | No significant prior attack events reported. Likely due to security measures. |
| Updatability | Rare | [5] | No significant prior attack events reported. Likely due to security measures. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Likely has proper authentication for connecting with other Xiaomi ecosystem products. |
| Communications | Encrypted with up-to-date encryption | [7] | Probably uses modern encryption for communication security. |
| Storage | Encrypted with up-to-date encryption | [8] | Most likely encrypts storage for data protection. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Allows comprehensive account management operations. |
| Authentication | Secure | [10] | Uses multiple secure authentication methods. |
| Brute-force protection | Exist | [11] | Likely has measures to prevent brute - force attacks. |
| Event logging | Access event logged | [12] | Probably logs access events for security and troubleshooting. |
| Passwords | Require change after setup with complexity requirements | [13] | Requires complex passwords and prompts for changes. |
| Category score | 1 | ||
| Grade | A |
|---|