Virgin Galactic Cautiously Returns To Flight

After Richard Branson delivered some inspiring words from his seat aboard SpaceShipTwo Unity, he unbuckled himself and started to float around the vehicle’s cabin along with three other Virgin Galactic employees. Reaching an apogee of 86 kilometers (53 miles), the passengers enjoyed four minutes of weightlessness during the July 2021 flight that was live-streamed over the Internet to an audience of millions. After years of delays, SpaceShipTwo had finally demonstrated it was capable of taking paying customers to the edge of space. As far as victories go — it was pretty impressive.

Yet despite the spectacle, weeks and months went by without an announcement about when commercial flights of the world’s first “spaceline” would finally begin. Now, nearly two years after Branson’s flight, Unity has flown again. Except instead of carrying the first group of customers, it performed the sort of un-powered test flight that Virgin Galactic hasn’t performed since 2017. Clearly, something didn’t go to plan back then.

Richard Branson aboard Unity

The company is being as tight-lipped as ever, saying only that this test flight was necessary to “evaluate the performance of the spaceship…following the modification period.” The exact nature of these modifications is unclear, but for some hints, we could look at the New Yorker article from September 2021. It alleged that, unwilling to derail Branson’s highly publicized flight, Unity’s pilots decided not to abort their ascent despite several warning lights in the cockpit alerting them that the vehicle’s trajectory was deviating from the norm. Virgin Galactic later denied their characterization of the event, but the fact remains that Unity did leave its designated airspace during the flight, and that the Federal Aviation Administration grounded the spacecraft until an investigation into the mishap could be completed. Continue reading “Virgin Galactic Cautiously Returns To Flight”

Jet Engine Tachometer Turned Into Unique CPU Utilization Meter

When you’ve got a piece of interesting old aviation hardware on your desk, what do you do with it? If you’re not willing to relegate it to paperweight status, your only real choice is to tear it down to see what makes it tick. And if you’re lucky, you’ll be able to put it to work based on what you learned.

That’s what happened when [Glen Akins] came across a tachometer for a jet airplane, which he promptly turned into a unique CPU utilization gauge for his computer. Much of the write-up is concerned with probing the instrument’s innards to learn its secrets, although it was clear from the outset that his tachometer, from Kollsman Instruments, was electrically driven. [Glen]’s investigation revealed a 3-phase synchronous motor inside the tach. The motor drives a permanent magnet, which spins inside a copper cup attached to the needle on the tach’s face. Eddy currents induced in the cup by the spinning magnet create a torque that turns the needle against the force of a hairspring. Pretty simple — but how to put the instrument to work?

[Glen]’s solution was to build what amounts to a variable frequency drive (VFD). His power supply is based on techniques he used to explore aircraft synchros, which we covered a while back. The drive uses a trio of MCP4802 8-bit DACs to generate three phase-shifted sine waves via direct digital synthesis with an RP2040. The 3-phase signal drives the motor and spins the dial, with 84-Hz corresponding to full-scale deflection.

The video below shows the resulting CPU utilization gauge — which just queries for the current load level and sends it to the RP2040 over serial — in action. It’s not exactly responsive to rapid changes, but that’s to be expected from a mechanical system. And compared to exploring such a nice instrument, it really doesn’t matter.

Continue reading “Jet Engine Tachometer Turned Into Unique CPU Utilization Meter”

Thermal Camera Plus Machine Learning Reads Passwords Off Keyboard Keys

An age-old vulnerability of physical keypads is visibly worn keys. For example, a number pad with digits clearly worn from repeated use provides an attacker with a clear starting point. The same concept can be applied to keyboards by using a thermal camera with the help of machine learning, but it also turns out that some types of keys and typing styles are harder to read than others.

Researchers at the University of Glasgow show how machine learning can pull details from thermal images like these quickly and effectively.

Touching a key with a fingertip imparts a slight amount of body heat, and that small amount of heat can be spotted by a thermal sensor. We’ve seen this basic approach used since at least 2005, and two things have changed since then: thermal cameras gotten much more common, and researchers discovered that by combining thermal readings with machine learning, it’s possible to eke out slight details too difficult or subtle to spot by human eye and judgement alone.

Here’s a link to the research and findings from the University of Glasgow, which shows how even a 16 symbol password can be attacked with an average accuracy of 55%. Shorter passwords are much easier to decipher, with the system attacking 6 and 8 symbol passwords with an accuracy between 92% and 80%, respectively. In the study, thermal readings were taken up to a full minute after the password was entered, but sooner readings result in higher accuracy.

A few things make things harder for the system. Fast typists spend less time touching keys, and therefore transfer less heat when they do, making things a little more challenging. Interestingly, the material of the keycaps plays a large role. ABS keycaps retain heat far more effectively than PBT (a material we often see in custom keyboard builds like this one.) It also turns out that the tiny amount of heat from LEDs in backlit keyboards runs effective interference when it comes to thermal readings.

Amusingly this kind of highly modern attack would be entirely useless against a scramblepad. Scramblepads are vintage devices that mix up which numbers go with which buttons each time the pad is used. Thermal imaging and machine learning would be able to tell which buttons were pressed and in what order, but that still wouldn’t help! A reminder that when it comes to security, tech does matter but fundamentals can matter more.