Yesido TWS38
From Wiki-IoT
Classification
| Yesido TWS38 | |
|---|---|
| Classification | |
| Grade | D |
| Calculator version | 1 |
| Classification date | 2025-10-09 |
| Information | |
| Name | Yesido TWS38 (TWS True Wireless Bluetooth Earphones) |
| Brand by Parent | Yesido by Shenzhen Yashitong Electronics Co., Ltd. |
| Generation | Not clearly divided (no official generation labeling) |
| Model(s) | TWS38 (no derivative models publicly disclosed) |
| Release date | 2022-03-04 |
| Type/Category | TWS True Wireless Bluetooth Earphones (Category: Audio Accessories) |
| Website | (official brand website) |
| Status | In sale |
| More | |
| Dimensions | - Single earbud: ~20mm × 18mm × 25mm - Charging case: ~60mm × 40mm × 28mm (from e-commerce parameters) |
| Mass | - Single earbud: ~4.5g - Charging case: ~35g (from e-commerce parameters) |
| Operating system | No independent operating system (relies on the connected device’s OS) |
| Companion App | No exclusive companion App; basic functions are adjusted via Bluetooth settings on the connected device |
| CPU | Realtek RTL8763BFR (or similar entry-level Bluetooth 5.3 chip, from teardown info) |
| GPU | No independent GPU (not required for TWS earphone functions) |
| Memory | Integrated 64KB-128KB RAM (built into the Bluetooth chip, entry-level standard) |
| Storage | No independent storage (does not support local music storage) |
| Battery | - Single earbud: ~30mAh - Charging case: ~300mAh (from e-commerce parameters) |
| Power | - Working power: ~5mW (Bluetooth connected state) - Charging power: Input (charging case) ~5V/1A (5W); Output ~5V/0.5A (2.5W) |
| Charging | - Port: Type-C (wired charging only, no wireless charging) - Charging time: Single earbud ~1.5h; Charging case ~2h (from product manual) |
| Display | No display (no screen on earbuds or charging case) |
| Camera | No camera (no imaging function) |
| Sound | - Driver unit: 10mm dynamic driver - Frequency response: 20Hz-20kHz - Audio codec: SBC - Additional: Basic call noise reduction (via built-in microphone) |
| Connectivity | - Bluetooth version: Bluetooth 5.3 - Connection range: ~10m (obstacle-free) - Supported protocols: HFP, HSP, A2DP, AVRCP - No NFC/WiFi/Bluetooth multipoint (public parameters) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [No official URLs (low user demand for tampering entry-level TWS earphones; no public cases)] | Non-modular design, high difficulty for user disassembly. No public tampering cases due to low practical value. |
| Known vulnerabilities | None | [No official URLs (no vulnerabilities recorded in CVE Details/NVD as of May 2024)] | Simple functions, no complex system, low vulnerability risk. No public reports. |
| Prior attacks | None | [No official URLs (no attack events reported by tech media/security institutions)] | No sensitive data processing capability, low attack value. No public attack records. |
| Updatability | None | [No official URLs (no firmware update function mentioned on brand website/product manual)] | Does not support firmware updates; cannot fix potential issues or optimize functions via software. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | No | [No official URLs (pairing only requires Bluetooth search, no system-level authentication)] | Only relies on basic Bluetooth pairing (default code 0000 or auto-pairing); no association with device accounts/cloud systems. |
| Communications | Encrypted with up-to-date encryption | [Reference: Bluetooth SIG official Bluetooth 5.3 encryption: https://www.bluetooth.com/specifications/bluetooth-core-specification/] | Adopts AES-CCM encryption (built into Bluetooth 5.3), a mainstream and up-to-date encryption method for Bluetooth transmission. |
| Storage | No encryption | [No official URLs (product parameters confirm no local storage)] | No music/data local storage capability; no storage module, so no storage encryption is needed. |
| Category score | 3 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Absent | [No official URLs (no account registration/login mentioned on brand platforms)] | No account system; users do not need to create/manage accounts to use the product. |
| Authentication | Absent | [No official URLs (no identity verification required after successful pairing)] | No user authentication (e.g., password/fingerprint); anyone with a paired device or re-pairing capability can use the earphones. |
| Brute-force protection | Absent | [No official URLs (no limit on Bluetooth pairing attempts)] | No limit on Bluetooth pairing attempts; if a simple pairing code (e.g., 0000) is used, brute-force cracking is theoretically possible. |
| Event logging | Absent | [No official URLs (no storage/App to record events)] | No ability to generate/store logs; cannot trace connection history or operation records. |
| Passwords | Default/Common/Easy to guess | [No official URLs (auto-pairing or default code 0000)] | No mandatory password change requirements; Bluetooth pairing uses common simple codes or no code, which is easy to guess. |
| Category score | 3 | ||
| Grade | D |
|---|