Samsung Galaxy Note 20
From Wiki-IoT
Classification
Samsung Galaxy Note 20 | |
---|---|
Classification | |
Grade | A- |
Calculator version | [[:Category:Calculator v|]] |
Classification date | |
Information | |
Name | Samsung Galaxy Note 20 |
Brand by Parent | Samsung by Samsung |
Generation | |
Model(s) | |
Release date | 2020-08-05 |
Type/Category | Smart phone |
Website | [www.samsung.com] |
Status | |
More | |
Dimensions | |
Mass | |
Operating system | |
Companion App | |
CPU | Snapdragon 865+ (7nm+) / Exynos 990 (7nm+) |
GPU | Adreno 650 (Snapdragon) / Mali-G77 MP11 (Exynos) |
Memory | 8 |
Storage | 256 |
Battery | 4300mAh |
Power | 16.6Wh |
Charging | 25W wired fast charging, 15W wireless charging, 4.5W reverse wireless charging |
Display | 2400 × 1080, Super AMOLED Plus, 60Hz |
Camera | 64 million pixel telephoto camera + 12 million pixel wide-angle camera + 12 million pixel ultra wide-angle camera + 10 million pixel front camera |
Sound | Stereo speakers tuned by AKG, support for AAC, MP3, FLAC, etc. |
Connectivity | 5G / 4G LTE; Wi-Fi 6; Bluetooth 5.0; NFC; IP68 water and dust resistance |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [1] | The Samsung Knox platform provides end-to-end security, from the chip to the software layer, making hardware-level tampering extremely difficult and rare. |
Known vulnerabilities | Very common | [2] | As a mainstream Android device, it is a primary target for security researchers. Consequently, vulnerabilities are discovered and reported very commonly. |
Prior attacks | Very common | [3] | The Android platform is a primary global target for malware, making attack attempts against devices running it very common. |
Updatability | Very common | [4] | The Note 20 received frequent security updates throughout its supported lifecycle (approx. 4 years). Note: Official update support effectively ended in early 2024. |
Category score | 3 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [5] | Supports all standard modern authentication protocols, allowing for secure integration with various cloud services and systems. |
Communications | Encrypted with up-to-date encryption | [6] | Supports the latest communication encryption standards of its time, such as WPA3 for Wi-Fi and TLS 1.3 for web traffic. |
Storage | Encrypted with up-to-date encryption | [7] | File-Based Encryption (FBE) is enabled by default, ensuring user data is encrypted at rest. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [8] | Provides full functionality for adding, removing, and managing permissions for Google, Samsung, and other third-party accounts. |
Authentication | Secure | [9] | Supports multiple strong authentication methods, such as ultrasonic fingerprint and PIN, which are protected by a hardware-backed security module. |
Brute-force protection | Exist | [10] | Triggers an increasing lockout delay mechanism after multiple incorrect unlock attempts, effectively preventing brute-force attacks. |
Event logging | Access event logged | [11] | The associated Google/Samsung account logs all critical security events, such as new device sign-ins, for user review. |
Passwords | Require change after setup with complexity requirements | [12] | Forces the user to create a screen lock (PIN, pattern, or password) that meets minimum complexity requirements during initial setup. |
Category score | 1 |
Grade | A- |
---|