Xiaomi didn't turn the glue up to 11 on its new Mi flagship, but still gets low marks for repairability

Yep. Gadget botherers had to haul out a 'specialist tool'


Released in China last year, and about to drop in the UK, the Xiaomi Mi 11 drew attention because of its status as the debut device for the Qualcomm Snapdragon 888 chipset. Now it has got the interest of right-to-repair campaigners iFixit for different reasons altogether.

And boy, was this latest teardown a mixed bag. Contradictory, even. On the one hand, Xiaomi made some servicing tasks – like replacing the battery – relatively straightforward, using simple adhesive pull-tabs rather than glue that must be dissolved with a solvent or strong isopropyl alcohol. Getting to the battery was a different matter, however, with iFixit's crew bemoaning a “tedious” process that required the delicate removal of multiple flex cables and antenna wires.

Xiaomi's Mi 11 flagship

Xiaomi a Snapdragon 888 flagship for €749: Yep, the Mi 11 is rolling out to world outside China

READ MORE

The display? Xiaomi chose to use a curved “infinity edge” screen, which, although pleasant to look at, proved to be a nightmare to detach. While a standard screen may be removed with something as simple as a spudger, iFixit was forced to resort to a specialist tool. The techies also correctly noted that curved screens tend to be delicate to remove, with a greater likelihood of splintering during excision.

iFixit pointed out that some repairs, such as the replacement of the under-screen fingerprint reader, required the removal of the display. And while this isn't typically a fault-prone component (you're far more likely to need to replace the battery or screen), it's still a bit annoying.

mi11

Three camera modules, two connectors to unplug. Pic via iFixit

The glass back of the Mi 11 added an element of risk, especially to smartphone owners who are prone to dropping their devices. Fortunately, replacements shouldn't prove too tricky, and Xiaomi used only a modest amount of glue. This allowed iFixit to yank it free without using any heat – a simple opening tool proved sufficient.

iFixit gave the Mi 11 a modest score of 4 out of 10. Not bad (the Samsung Galaxy S21 Ultra scored a dismal three), but not amazing, especially when compared to the iPhone 12 family, which scored six.

Xiaomi won plaudits for its use of modular components, standard Philips screws, and general lack of adhesive, but these were largely nullified by the construction of the display, which the the iFixit techies found was not conducive to long-term servicing.

The notion of repairability is largely subjective (just ask Apple) and it's not something consumers regularly consider when buying kit. But as some customers increasingly hold off on upgrading their devices (per Gartner's figures, the average wait is between 2.5 and 2.8 years), and more become conscious of the environmental impact of manufacturing new devices, this may change. ®


Other stories you might like

  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware
    Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

    Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.

    In a technical report this week, the folks at Prodaft, which has been tracking the cybercrime gang since 2021, outlined its own findings on Wizard Spider, supplemented by info that leaked about the Conti operation in February after the crooks publicly sided with Russia during the illegal invasion of Ukraine.

    What Prodaft found was a gang sitting on assets worth hundreds of millions of dollars funneled from multiple sophisticated malware variants. Wizard Spider, we're told, runs as a business with a complex network of subgroups and teams that target specific types of software, and has associations with other well-known miscreants, including those behind REvil and Qbot (also known as Qakbot or Pinkslipbot).

    Continue reading
  • Supreme Court urged to halt 'unconstitutional' Texas content-no-moderation law
    Everyone's entitled to a viewpoint but what's your viewpoint on what exactly is and isn't a viewpoint?

    A coalition of advocacy groups on Tuesday asked the US Supreme Court to block Texas' social media law HB 20 after the US Fifth Circuit Court of Appeals last week lifted a preliminary injunction that had kept it from taking effect.

    The Lone Star State law, which forbids large social media platforms from moderating content that's "lawful-but-awful," as advocacy group the Center for Democracy and Technology puts it, was approved last September by Governor Greg Abbott (R). It was immediately challenged in court and the judge hearing the case imposed a preliminary injunction, preventing the legislation from being enforced, on the basis that the trade groups opposing it – NetChoice and CCIA – were likely to prevail.

    But that injunction was lifted on appeal. That case continues to be litigated, but thanks to the Fifth Circuit, HB 20 can be enforced even as its constitutionality remains in dispute, hence the coalition's application [PDF] this month to the Supreme Court.

    Continue reading
  • How these crooks backdoor online shops and siphon victims' credit card info
    FBI and co blow lid off latest PHP tampering scam

    The FBI and its friends have warned businesses of crooks scraping people's credit-card details from tampered payment pages on compromised websites.

    It's an age-old problem: someone breaks into your online store and alters the code so that as your customers enter their info, copies of their data is siphoned to fraudsters to exploit. The Feds this week have detailed one such effort that reared its head lately.

    As early as September 2020, we're told, miscreants compromised at least one American company's vulnerable website from three IP addresses: 80[.]249.207.19, 80[.]82.64.211 and 80[.]249.206.197. The intruders modified the web script TempOrders.php in an attempt to inject malicious code into the checkout.php page.

    Continue reading

Biting the hand that feeds IT © 1998–2022