THREAD Tonight, some live tweeting making dinner. This evening comes from a little further afield from last time. No spoilers as to what it is until the end. Guesses are welcome 😃 #Cooking#Cuisine
First, a load of Pecorino Romano cheese in a bowl.
Roast a lot of tellicherry peppercorns
Course grind the peppercorns
Add 2/3 of the ground peppercorns to the cheese
Add a small amount of cold water and blend until it forms a paste
Boil your pasta water. It should be “as salty as the sea” in the words of my grandmother.
Boil your pasta until half done
More pepper in the pan + pasta water and reduce
Add the pasta to the pan of pepper water until al dente
Transfer al dente pasta to a bowl and add cheese paste
Mix quickly with a little bit more pasta water
Tada! Cacio e Pepe the greatest Roman dish
• • •
Missing some Tweet in this thread? You can try to
force a refresh
A thread on bad analysis. When #ThreatIntel analysts want to show off their Foreign Policy and Economist subscription status after reading the Russian foreign policy Wikipedia page /n #threatintelligence#cybersecurity#infosec
Most analysts who are "doing attribution" aren't doing good cyber threat intelligence, they're doing poor foreign policy analysis
They neither have neither the data nor the expertise to make even a moderately confident statement on attribution
False flag operations are very rare because they're risky and the blowback effects are bad. Interestingly, the risks increase the more "important" you are so the most powerful countries are less likely to conduct FF ops. /1 #infosec#cybersecurity#ThreatIntel
Traditional covert and clandestine operations are cheaper, less risky, and more likely to succeed than false flag ops. Importantly, not all attempts to redirect blame is a false flag but just considered standard covert ops. /2
False flags are also generally misunderstood and confused. For example, using Russian as an English speaker in malware is, by itself, not a false flag but rather just considered good covert practice. It doesn't attempt to place blame but just conceal the operators better. /3
First, health data has ALWAYS been considered protected and sensitive. Hence, the privacy requirements and oaths physicians abide by - courts have LONG recognized this privacy.
Here, we're going to have health data records tied to a person tied to a phone tied to a location. It's literally a real-time walking health report.
"My kingdom is not of this world. If my kingdom were of this world, my servants would have been fighting, that I might not be delivered over to the Jews. But now (or 'as it is') my kingdom is not from the world" (John 18:36) #theocracy#chosenonecnn.com/2019/11/25/pol…
This line of thinking make the problem of evil sooo much worse. If Rick Perry believes this, then he must believe God ordained Hitler and the Holocaust too.
Jesus made it clear that civil government and God's kingdom were not related. "Render unto Caesar the things that are Caesar's, and unto God the things that are God's" (Matthew 22:21)