PiPO P10 Phoenix OS 2-in-1 Laptop is Powered by Rockchip RK3399 Processor

Phoenix OS is an operating system based on Android 7.1 with desktop optimizations, and is one of the last few options if you plan to run Android on x86 platforms as other projects such as Remix OS have stopped providing images, at least for the consumer market.

The operating system also work on Arm platforms, but it is not open source – except for a Linux kernel release a few months ago -, manufacturers partners with the company to port the OS to their hardware. PiPO P10 2-in-1 laptop is one of those devices, and thanks to Rockchip RK3399 processor should offer decent performance.

PiPO P10 (preliminary) specifications:

  • SoC – Rockchip RK3399 hexa core processor with 2x Cortex A72 cores, 4x Cortex A53 cores, Mali-860MP4 GPU
  • System Memory – 4GB DDR3 RAM
  • Storage – 32 or 64GB storage, 1x micro SD slot
  • Display – 10.1″ capacitive touch display with 2560×1600 resolution; 10-point touch
  • Video Output – 1x micro HDMI port
  • Audio – 3.5mm audio jack, built-in microphone, stereo speakers, HDMI audio output
  • Camera – 8MP rear camera with auto focus, flashlight; 5MP front-facing camera
  • Connectivity – 802.11 b/g/n/ac WiFi, Bluetooth 4.0, maybe GPS
  • USB – 1x micro USB port
  • Sensors – Fingerprint sensor, Gravity sensor, Light sensor, Compass, Gyro
  • Battery – 6,600mAh @ 3.7V (24.42Wh)
  • Power Supply – 5V/2.5A
  • Dimensions – 255 x 164 x 7.8 mm (materials: metal+plastic back)
  • Weight – 510 grams without keyboard

The tablet / laptop ships with a power adapter, a pair of earphones, a USB cable, and an OTG cable. Keyboard, digital pen, and fingerprint scanner are shown to be optional on the manufacturer website.

The device can be found on GearBest with keyboard and digital pen for $249.69 including shipping.  The device is also listed as out of stock on the unofficial PiPO store. While talking about GearBest, you may want to change your password, as there has allegedly been a leak of some (162) customers emails, password (plain text), and address.

Via AndroidPC.es

Share this:
FacebookTwitterHacker NewsSlashdotRedditLinkedInPinterestFlipboardMeWeLineEmailShare

Support CNX Software! Donate via cryptocurrencies, become a Patron on Patreon, or purchase goods on Amazon or Aliexpress

ROCK 5 ITX RK3588 mini-ITX motherboard

12 Replies to “PiPO P10 Phoenix OS 2-in-1 Laptop is Powered by Rockchip RK3399 Processor”

  1. While talking about Gearbest it should be noted that they horribly failed to deal with this data breach and show a total lack of understanding what happened (storing passwords at all instead of salted hashes is already so dumb and then using an API that allows everyone to retrieve these informations combined with address details… no more to add).

    Gearbest victims should immediatey check the email addresses they used when having ordered something there at https://haveibeenpwned.com/

  2. @tkaiser
    When I tried to buy something on their website, they asked me to write my credit card details on unsecure webpage (http instead of https). I don’t understand why GearBest is so popular while they don’t respect their users security. There is no customers service because they didn’t even try to answer when I reported this problem.

  3. BTW: My GearBest email address doesn’t show up on https://haveibeenpwned.com/ (I use an own address with an own unique password for every site to track both spam and minimize harm once a breach happens — and such breaches happen everywhere and all the time but I’ve not seen such an irresponsible behaviour like GearBest’s before).

    But as someone on Reddit pointed out correctly wrt the few customer details on pastebin: ‘The list is proof of concept that the site can be hacked. You should assume you’re affected even if you aren’t on the list’ — he’s right since the shop’s API is vulnerable (problem) and some customer details showing up somewhere is just one symptom.

    Changed my postal address in GearBest’s database to something bogus since I would assume changing database contents might work while they will never really delete anything.

  4. cnxsoft :
    They don’t seem to have noticed their API is the problem.

    Maybe they (or someone else inside the company other than those PR people writing disturbing/damaging statements now) realized that they have a problem. But it’s really somewhat stupid claiming unidentified hackers would use data they found elsewhere to break into GB accounts in a thread that started with ‘I got an unusual hit on Friday, a Pastebin paste with my email address, password and order information for an order I placed with Gearbest amongst hundreds of other customers’ and where already technical details about how the data could be exfiltrated were discussed.

    It doesn’t matter much what Gearbest is telling now but it’s important what they did within the last days: nothing to inform/protect their affected customers.

  5. With the power of internet search these days fragments from one breach can often allow data gathering from other accounts, watching experimental AI, got at it is very sobering. As it builds A4 size data sheets on some people from numerous facts scattered over the net.

  6. Gets even more funny:

    Our IT department have investigated this issue and we have identified a few hundred accounts that may have been exposed. Immediately after this knowledge came to our attention we have frozen these accounts and contacted the affected users.

    Our investigation concludes that it is unlikely that our users information can be leaked from our system. What has likely happened is that ill-intentioned people bought and/or hacked user login information from other websites and were trying to see if those data could access GearBest. As far as we know, those hackers used some special software to facilitate uploading large volumes of leaked data from other sites to try to deceptively login with Gearbest from a group of high risk IPs.

    Apart from the steps we have taken above to alert our customers to update their passwords, we are also urgently working on risky IP identification and a more complicated verification code to prevent systematic password testing.

    We would like to take this opportunity to thank you for raising this issue. Please rest assured that Gearbest remains a safe website and will strive to keep protecting the interest of our users to the best of our abilities.”

    At least Gearbest’s PR guy who wrote the above sentences has not the slightest idea what he/she is talking about (and the two words unlikely/likely illustrate that nicely 🙂 )

    If Gearbest has been brute-forced using other logon credential databases then something as simple as Fail2Ban would already help, the IT staff responsible for the server would’ve noticed this already and of course a ‘more complicated verification code’ is pure BS when it’s about externals testing through hundreds of thousands possible logon combinations. The attempt as a whole would’ve triggered an alert already if they’re telling the truth.

  7. I’m curious to know what the “digital pen” is. Is it just a capacitive stylus, or something more like a Wacom pen?

Leave a Reply

Your email address will not be published. Required fields are marked *

Khadas VIM4 SBC
Khadas VIM4 SBC