Xiaomi Redmi k20

From Wiki-IoT


Classification

Xiaomi Redmi k20
Classification
Grade A-
Calculator version 1
Classification date 2024-10-31
Information
Name Redmi K20
Brand by Parent Xiaomi by Xiaomi Corporation
Generation K20 series
Model(s) Redmi K20
Release date 2019-05-28
Type/Category Smartphone
Website [1]
Status End of sale
More
Dimensions 156.7 x 74.3 x 8.8mm
Mass 191g
Operating system MIUI (based on Android 9) initially, upgradable
Companion App Mi Home
CPU Qualcomm Snapdragon 730
GPU Adreno 618
Memory 6GB RAM
Storage 64GB/128GB
Battery 4000mAh with 18W fast charging
Power 4000mAh
Charging 18W
Display 6.39 - inch, 2340 x 1080 resolution, AMOLED
Camera Rear: 48 - MP + 8 - MP + 13 - MP
Sound
Connectivity Rear: 48 - MP + 8 - MP + 13 - MP
Device
Criterion Value Proof(s) Comment
Known hardware tampering Rare [2] The hardware structure is relatively firm. Unauthorized modification is difficult due to the solid design and manufacturing process. Although not entirely impossible.
Known vulnerabilities Rare [3] Xiaomi addresses potential security issues. There are relatively few serious and widespread known vulnerabilities thanks to timely updates.
Prior attacks None [4] As of now, no significant prior attack events have been reported for the Redmi K20. This may be due to its security design, but it doesn't mean it's completely risk - free.
Updatability Rare [5] The update frequency has decreased over time. However, some support was provided during its life cycle for user experience and security.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Full [6] Likely has good authentication for connecting with other systems based on Xiaomi's ecosystem and common practices.
Communications Encrypted with obselete encryption [7] Probably uses modern encryption for communication to ensure data security.
Storage Encrypted with obselete encryption [8] Most likely encrypts storage to protect user data.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Full [9] Allows comprehensive account management operations like creating, deleting, and password changing.
Authentication Secure [10] Uses multiple authentication methods like biometrics and passwords for security.
Brute-force protection Exist [11] Expected to have measures to prevent brute - force attacks on passwords.
Event logging Access event logged [12] Probably logs access events for security and troubleshooting.
Passwords Require change after setup with complexity requirements [13] Typically requires complex passwords and prompts for changes to enhance security.
Category score 1
Grade A-