Xiaomi Redmi K30i
From Wiki-IoT
Classification
| Xiaomi Redmi K30i | |
|---|---|
| Classification | |
| Grade | B |
| Calculator version | 1 |
| Classification date | 2025-10-14 |
| Information | |
| Name | Redmi K30i |
| Brand by Parent | Redmi by Xiaomi Corporation |
| Generation | Redmi K30 series |
| Model(s) | Redmi K30i |
| Release date | 2020-06-02 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of life |
| More | |
| Dimensions | 165.3×76.6×8.79mm |
| Mass | 208g |
| Operating system | MIUI 11 |
| Companion App | Mi App Store |
| CPU | Qualcomm Snapdragon 765G |
| GPU | Adreno 620 |
| Memory | 6GB LPDDR4X |
| Storage | 128GB UFS 2.1 |
| Battery | 4500mAh |
| Power | |
| Charging | 30W fast charging |
| Display | 6.67 - inch LCD, 2400×1080 resolution, 120Hz refresh rate |
| Camera | Rear: 48MP + 8MP + 5MP + 2MP; Front: 20MP + 2MP |
| Sound | Dual speakers |
| Connectivity | 5G, Wi - Fi 5, Bluetooth 5.1, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | No public reports of hardware tampering for Redmi K30i. |
| Known vulnerabilities | Rare | [3] | Few publicly known vulnerabilities reported for this model. |
| Prior attacks | None | [4] | No public reports of prior targeted attacks on Redmi K30i. |
| Updatability | Very common | [5] | Xiaomi regularly provides software updates for Redmi devices, including Redmi K30i. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Partial | [6] | Can authenticate with some Xiaomi ecosystem devices and services partially. |
| Communications | Encrypted with up-to-date encryption | [7] | Uses modern encryption protocols for data transmission. |
| Storage | Encrypted with up-to-date encryption | [8] | Employs up - to - date encryption for data at rest. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Basic | [9] | Allows basic account creation, login, and simple settings. |
| Authentication | Secure | [10] | Uses secure methods like biometrics (fingerprint, face) and strong password policies. |
| Brute-force protection | Exist | [11] | Has mechanisms to detect and block brute - force attempts. |
| Event logging | Access event logged | [12] | Logs user access events for security auditing. |
| Passwords | Require change after setup with complexity requirements | [13] | Requires password change after initial setup and enforces complexity rules. |
| Category score | 2 | ||
| Grade | B |
|---|