Xiaomi Redmi K60
From Wiki-IoT
Classification
| Xiaomi Redmi K60 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-31 |
| Information | |
| Name | Redmi K60 |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | K60 series |
| Model(s) | Redmi K60 |
| Release date | 2022-12-27 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | Length: 162.78mm;Width: 75.44mm;Thickness: 8.59mm |
| Mass | 204g |
| Operating system | MIUI 14 (based on Android 13) |
| Companion App | Mi Home |
| CPU | Qualcomm Snapdragon 8 + Gen 1 |
| GPU | Adreno 730 |
| Memory | LPDDR5 RAM with options of 8GB, 12GB, or 16GB |
| Storage | UFS 3.1 storage with options of 128GB, 256GB, or 512GB |
| Battery | 5500mAh with 67W wired fast charging and 30W wireless fast charging |
| Power | 5500mAh |
| Charging | 67W |
| Display | 6.67 - inch, 3200 x 1440 resolution, 120Hz refresh rate OLED flat screen |
| Camera | Rear: 64 - MP main camera + 8 - MP ultrawide - angle camera + 2 - MP macro camera |
| Sound | Stereo speakers with Dolby Atmos |
| Connectivity | Wi - Fi 6, Bluetooth 5.3, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | There are few reports regarding hardware tampering of Redmi K60 |
| Known vulnerabilities | Rare | [3] | As of now, there are relatively few known vulnerabilities reported for this device. |
| Prior attacks | None | [4] | As of now, there are relatively few known vulnerabilities reported for this device. |
| Updatability | Very common | [5] | Xiaomi usually provides regular software updates for its devices including security patches. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | The device has proper authentication mechanisms when interacting with other Xiaomi ecosystem products. |
| Communications | Encrypted with up-to-date encryption | [7] | The device uses modern encryption methods for communication. |
| Storage | Encrypted with up-to-date encryption | [8] | The device uses modern encryption methods for communication. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Users can manage their accounts with various options like password change, etc. |
| Authentication | Secure | [10] | The device has secure authentication features like fingerprint and face unlock. |
| Brute-force protection | Exist | [11] | The device has secure authentication features like fingerprint and face unlock. |
| Event logging | Access event logged | [12] | The device logs relevant access events. |
| Passwords | Require change after setup with complexity requirements | [13] | When setting up accounts, users are prompted to set complex passwords. |
| Category score | 1 | ||
| Grade | A |
|---|