Xiaomi Redmi k40
From Wiki-IoT
Classification
Xiaomi Redmi k40 | |
---|---|
Classification | |
Grade | A |
Calculator version | 1 |
Classification date | 2024-10-31 |
Information | |
Name | Redmi K40 |
Brand by Parent | Xiaomi by Xiaomi Corporation |
Generation | K40 series |
Model(s) | Redmi K40 |
Release date | 2021-02-25 |
Type/Category | Smartphone |
Website | [1] |
Status | End of sale |
More | |
Dimensions | 163.7 x 76.4 x 7.8mm |
Mass | 196g |
Operating system | MIUI 12 (based on Android 11), upgradable |
Companion App | Mi Home |
CPU | Qualcomm Snapdragon 870 |
GPU | Adreno 650 |
Memory | 6GB/8GB/12GB RAM |
Storage | 128GB/256GB |
Battery | 4520mAh with 33W fast charging |
Power | 4520mAh |
Charging | 33W fast charging |
Display | 6.67 - inch, 2400 x 1080 resolution, AMOLED |
Camera | Rear: 48 - MP + 8 - MP + 5 - MP |
Sound | Dual - stereo speakers |
Connectivity | Wi - Fi 6, Bluetooth 5.1, NFC |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [2] | The device's hardware structure is robust. Tampering is not a common occurrence. |
Known vulnerabilities | Rare | [3] | Xiaomi takes care of security. There are few known security holes. |
Prior attacks | None | [4] | There's no record of major prior attacks. Thanks to security precautions. |
Updatability | Rare | [5] | Updates were less frequent as it aged. Some support was there during its life. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [6] | Presumably has good authentication for other systems in the Xiaomi ecosystem. |
Communications | Encrypted with up-to-date encryption | [7] | Likely uses modern encryption for communication. |
Storage | Encrypted with up-to-date encryption | [8] | Probably encrypts storage for safety. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [9] | Enables a wide range of account management functions. |
Authentication | Secure | [10] | Employs multiple secure authentication means. |
Brute-force protection | Exist | [11] | Probably has measures against brute - force attacks. |
Event logging | Access event logged | [12] | May log access events for security and troubleshooting. |
Passwords | Require change after setup with complexity requirements | [13] | Demands complex passwords and changes for security. |
Category score | 1 |
Grade | A |
---|