Samsung Exynos Vulnerability: Galaxy S8 and Exynos 9 Chipset

It appears that Samsung is constantly in the spotlight, with speculation and reports surrounding their forthcoming flagship device intensifying. Today, news broke that Samsung will be sourcing batteries for the Galaxy S8 from Sony, and subsequently, a Ukranian retailer’s listing provided hints about color variations and pricing. Adding to the excitement, Samsung released a teaser tweet inviting users to ‘Discover Cloud 9 with Exynos,’ suggesting that their upcoming processor will be part of the Exynos 9 series.

Samsung Exynos Vulnerability: Galaxy S8 and Exynos 9 Chipset – Overview

Earlier reports indicated that the Galaxy S8 was expected to be powered by the Snapdragon 835 chipset, with Samsung securing early access to it, leaving LG and Sony unable to acquire the latest chipset. This led LG to use the Snapdragon 821, while Sony postponed the release of their flagship device to Q2. However, with recent updates, it seems Samsung may opt for a dual-processor approach, combining the Exynos and Snapdragon processors. The anticipated Exynos 8895 was initially linked to power the device, but it appears that Samsung will introduce this chipset as a part of the Exynos 9 series.

Information on the Exynos 8895, now known as Exynos 9, suggests that it will be manufactured using the 10nm process, enhancing both speed and energy efficiency. Expected to feature the Mali-G71 GPU supporting 4K and VR content, the Exynos 9 chipset is poised to deliver enhanced performance capabilities.

Speculations point towards a potential announcement of the Exynos 9 chipset during the MWC. Clarifying whether the Exynos 8895 is indeed a part of the Exynos 9 series or a distinct entity remains a puzzle that awaits resolution, with ongoing updates on this intriguing development to be shared as they unfold. By addressing vulnerabilities and strengthening security measures, Samsung reaffirms its commitment to providing a safe and reliable smartphone experience, setting a precedent for proactive cybersecurity practices in the mobile industry.

Origin

Feel free to ask questions concerning this post by writing in the comment section below.

About The Author

Reply

error: Content is protected !!