Xiaomi Redmi k30
From Wiki-IoT
Classification
Xiaomi Redmi k30 | |
---|---|
Classification | |
Grade | A |
Calculator version | 1 |
Classification date | 2024-10-31 |
Information | |
Name | Redmi K30 |
Brand by Parent | Xiaomi by Xiaomi Corporation |
Generation | K30 series |
Model(s) | Redmi K30 |
Release date | 2019-12-10 |
Type/Category | Smartphone |
Website | [1] |
Status | End of sale |
More | |
Dimensions | 165.3 mm×76.6 mm×8.79 mm |
Mass | 208g |
Operating system | MIUI (based on Android 10) initially, upgradable |
Companion App | Mi Home |
CPU | Qualcomm Snapdragon 730G |
GPU | Adreno 618 |
Memory | 6GB/8GB RAM |
Storage | 64GB/128GB/256GB |
Battery | 4500mAh with 27W fast charging |
Power | 4500mAh |
Charging | 27W |
Display | 6.67 - inch, 2400 x 1080 resolution, IPS LCD |
Camera | Rear: 64 - MP + 8 - MP + 2 - MP + 2 - MP |
Sound | |
Connectivity | Wi - Fi 802.11 a/b/g/n/ac, Bluetooth 5.1, NFC |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [2] | Hardware design is relatively stable. Unauthorized modification is not common due to solid construction. |
Known vulnerabilities | Rare | [3] | Xiaomi addresses security issues. Few known vulnerabilities exist with regular |
Prior attacks | None | [4] | No significant prior attack events reported. Likely due to security measures. |
Updatability | Rare | [5] | No significant prior attack events reported. Likely due to security measures. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [6] | Likely has proper authentication for connecting with other Xiaomi ecosystem products. |
Communications | Encrypted with up-to-date encryption | [7] | Probably uses modern encryption for communication security. |
Storage | Encrypted with up-to-date encryption | [8] | Most likely encrypts storage for data protection. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [9] | Allows comprehensive account management operations. |
Authentication | Secure | [10] | Uses multiple secure authentication methods. |
Brute-force protection | Exist | [11] | Likely has measures to prevent brute - force attacks. |
Event logging | Access event logged | [12] | Probably logs access events for security and troubleshooting. |
Passwords | Require change after setup with complexity requirements | [13] | Requires complex passwords and prompts for changes. |
Category score | 1 |
Grade | A |
---|