Cyclocopter Flies With Eight Spinning Horizontal Wings

For conventional vertical takeoff and landing rotors on vertical shafts are the most common solution, as seen in helicopters and multirotors. A much less popular solution is the cyclocopter, which consists of a pair of rotors spinning around a horizontal shaft with horizontal blades. [Nicholas Rehm] built a remote-controlled cyclocopter as part of a research project and gave us an excellent overview of this unique craft in the video after the break.

Also known as the cyclogyro, the idea is not new, with the first one constructed in 1909. The first flight was a long time later in the 1930s, but it was quickly discovered that they were too unstable to be flown manually by a human, so the idea was shelved. Thanks to modern microcontrollers, researchers have recently been able to build small-scale versions, like the tiny example from the University of Texas.

Lift is produced using four or more airfoils on each of the two cycloidal rotors. At the top and bottom of rotation they have a positive angle of attack, with a neutral angle on the sides. The blades’ angle of attack can be adjusted to produce forward or reverse thrust. An additional motor with a conventional propeller is mounted on the nose to counteract the torque created by the main rotors, similar to a helicopter’s tail rotor.

Unlike multirotors, cyclocopters don’t need to pitch forward to move horizontally. The blades also don’t need to be tapered and twisted like a conventional rotorcraft, since the relative airflow velocity remains constant along the length of the blade. However, they have some significant downsides that will likely prevent them from moving beyond the experimental stage for the foreseeable future. The rotors are quite complex mechanically and need to be very lightweight since the design doesn’t lend itself to great structural strength. This was demonstrated by [Nicholas] when a minor crash snapped one of the rotor arms. However, it is an excellent demonstration of the adaptability of [Nicholas]’ open-source dRehmFlight flight controller, which he has also used to fly a VTOL F-35 and belly-flopping starship.

Would you be surprised that this isn’t our first cyclocopter hack?
Continue reading “Cyclocopter Flies With Eight Spinning Horizontal Wings”

This Week In Security: Insecure Chargers, Request Forgeries, And Kernel Security

The folks at Pen Test Partners decided to take a look at electric vehicle chargers. Many of these chargers are WiFi-connected, and let you check your vehicle’s charge state via the cloud. How well are they secured? Predictably, not as well as they could be.

The worst of the devices tested, Project EV, didn’t actually have any user authentication on the server side API. Knowing the serial number was enough to access the account and control the device. The serial numbers are predictable, so taking over every Project EV charger connected to the internet would have been trivial. On top of that, arbitrary firmware could be loaded remotely onto the hardware was possible, representing a real potential problem.

The EVBox platform had a different problem, where an authenticated user could simply specify a security role. The tenantadmin role was of particular interest here, working as a superadmin that could see and manage multiple accounts. This flaw was patched within an impressive 24 hours. The EVBox charger, as well as several other devices they checked had fundamental security weaknesses due to their use of Raspberry Pi hardware in the product. Edit: The EVBox was *not* one of the devices using the Pi in the end product.

Wait, What About the Raspberry Pi?

Apparently the opinion that a Raspberry Pi didn’t belong in IoT hardware caught Pen Test Partners some flack, because a few days later they published a follow-up post explaining their rationale. To put it simply, the Pi can’t do secure boot, and it can’t do encrypted storage. Several of the flaws they found in the chargers mentioned above were discovered because the device filesystems were wide open for inspection. A processor that can handle device encryption, ideally better than the TPM and Windows Bitlocker combination we covered last week, gives some real security against such an attack. Continue reading “This Week In Security: Insecure Chargers, Request Forgeries, And Kernel Security”

Overhauling A Battle Bot

Where do old battle bots go to die? Well the great parts-bin in the sky corner of the workshop, where they await disassembly and use in other projects. But once in a while, if a battle bot is really lucky, they get pulled out again and put back into working order. So is the story [Charles] is telling about Overhaul 1, a hulk of a robot who was last see in fighting shape during the 2015 season of the show.

Having been succeeded by newer designs (Overhaul 2 and Overhaul 3), it’s a surprise to see some work being poured into these old bones. It didn’t escape the parts bin unscathed, having lost it’s wheels to another design called sadbot. What’s in place now are “shuffle drive pods”, a cam-based system that kind of crawls the robot along. They’re fun to watch in action in the video after the break, just make sure to turn your volume way down first. It’s no wonder [Charles] plans to replace them with newly-designed wheel modules.

In the heat of a match these things take a lot of damage, and the frame of Overhaul 1 was still twisted and mangled. A hydraulic tire jack is the tool of choice as the damage was caused externally and needed to be pushed out from the inside. As a testament to how these things are built, any old jack just won’t do and a 20-ton unit was acquired for the purpose. A set of prongs on the front (called pontoons) was also bent inward and required a chain and a come-along to pull them out.

The nice thing about revisiting projects years later is that technology tends to move forward. We can imagine that the design work [Charles] has in progress for a new set of wheel modules is much easier, and the parts (motors, drivers, batteries, etc) of a much higher quality than when first built over half a decade ago. This is the first installment in the overhaul of Overhaul series, which we’ll be keeping an eye on.

Need to sate your appetite for how to build indestructible robots? Check out how the indestructible wheels for the “Copperhead” bot are fabricated!

Continue reading “Overhauling A Battle Bot”

SBITX: Hackable HF SDR For The Raspberry Pi

Cheap, easy to use SDR dongles are an immensely powerful tool for learning about radio technology. However, building your own SDR is not something too many hackers are confident to tackle. [Ashhar Farhan, VU2ESE] hopes to change this with the sBITX, a hackable HF SDR transceiver designed around the Raspberry Pi.

[Ashhar] introduced the project in talk at the virtual “Four Days In May” annual conference of the QRP Amateur Radio Club International. Watch the full talk in the video after the break. He first goes over the available open source SDR radios, and then delves into his design decisions for the sBITX. One of the primary goals of the project was to lower the barrier of entry. To do this, he chose the Raspberry Pi as base, and wrote C code that that anyone who has done a bit of Arduino programming should be able to understand and modify. The hardware is designed to be as simple as possible. On the receive side, a simple superheterodyne architecture is used to feed a 25 kHz wide slice of RF spectrum to an audio codec, which send the digitized audio to the Raspberry Pi. The signal is then demodulated in software using FFT. For transmit, the signal is generated in software, and then upconverted to the desired RF frequency. [Ashhar] also created a GUI for the 7″ Raspberry Pi screen.

At the moment the sBITX is still in the development stage, information is spread between the video after the break, it’s accompanying PDF, the GitHub repo, and a thread on the BITX20 group.

[Ashar Farhan] is well known in the ham radio community for low cost radio designs like the BITX, and it’s successor, the μBITX. He also created the Antuino, an Arduino based antenna tester. Continue reading “SBITX: Hackable HF SDR For The Raspberry Pi”