Xiaomi Redmi k20
From Wiki-IoT
Classification
Xiaomi Redmi k20 | |
---|---|
Classification | |
Grade | A- |
Calculator version | 1 |
Classification date | 2024-10-31 |
Information | |
Name | Redmi K20 |
Brand by Parent | Xiaomi by Xiaomi Corporation |
Generation | K20 series |
Model(s) | Redmi K20 |
Release date | 2019-05-28 |
Type/Category | Smartphone |
Website | [1] |
Status | End of sale |
More | |
Dimensions | 156.7 x 74.3 x 8.8mm |
Mass | 191g |
Operating system | MIUI (based on Android 9) initially, upgradable |
Companion App | Mi Home |
CPU | Qualcomm Snapdragon 730 |
GPU | Adreno 618 |
Memory | 6GB RAM |
Storage | 64GB/128GB |
Battery | 4000mAh with 18W fast charging |
Power | 4000mAh |
Charging | 18W |
Display | 6.39 - inch, 2340 x 1080 resolution, AMOLED |
Camera | Rear: 48 - MP + 8 - MP + 13 - MP |
Sound | |
Connectivity | Rear: 48 - MP + 8 - MP + 13 - MP |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [2] | The hardware structure is relatively firm. Unauthorized modification is difficult due to the solid design and manufacturing process. Although not entirely impossible. |
Known vulnerabilities | Rare | [3] | Xiaomi addresses potential security issues. There are relatively few serious and widespread known vulnerabilities thanks to timely updates. |
Prior attacks | None | [4] | As of now, no significant prior attack events have been reported for the Redmi K20. This may be due to its security design, but it doesn't mean it's completely risk - free. |
Updatability | Rare | [5] | The update frequency has decreased over time. However, some support was provided during its life cycle for user experience and security. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [6] | Likely has good authentication for connecting with other systems based on Xiaomi's ecosystem and common practices. |
Communications | Encrypted with obselete encryption | [7] | Probably uses modern encryption for communication to ensure data security. |
Storage | Encrypted with obselete encryption | [8] | Most likely encrypts storage to protect user data. |
Category score | 2 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [9] | Allows comprehensive account management operations like creating, deleting, and password changing. |
Authentication | Secure | [10] | Uses multiple authentication methods like biometrics and passwords for security. |
Brute-force protection | Exist | [11] | Expected to have measures to prevent brute - force attacks on passwords. |
Event logging | Access event logged | [12] | Probably logs access events for security and troubleshooting. |
Passwords | Require change after setup with complexity requirements | [13] | Typically requires complex passwords and prompts for changes to enhance security. |
Category score | 1 |
Grade | A- |
---|