My wife and I are launching a new business and this week is menu prep and creation. Takoyakis made with proper Katsuobishi and Nori.
All hand made and yeah I think these will be popular
Second menu option testing. Chicken laksa curry learned from our time living in Singapore. We struggle to get a proper laksa here in London so time to change that.
Our take on a Malay/Singaporean classic
When making the paste, it's the combination of the lemon grass, coconut milk, tumeric and most importantly the umami (5th taste) for which shrimp paste does the job. So we tried to find a vegetarian/vegan option and I think our nori sheets from the takoyaki could add the alt
We are hoping to make all dishes available in vegetarian/vegan too, something that's missing a lot with delivery food these days
• • •
Missing some Tweet in this thread? You can try to
force a refresh
When software nerds get into tuning and hacking older ECUs. One of my plans for the Lancia Delta is to fully understand the Magneti Marelli/WEBER ECU.
I'm going down the hardware route, but found out yesterday that someone went down the software route and made something amaze
A fully functional L8 emulator that includes a full disassembler and assembler for both the Motorola 6803 and 68HC11 microprocessors so all code written for these chips may be analysed and modified.
It's a Sunday.
Kids are playing Lego
Wife is chilled
Guess this means it's teardown and tinker time with IKEAs indoor pollution sensor
Ok it's pretty well-designed. David Wahl is the designer, who's responsible for a lot of pretty damn good designs. Has usb-c to power but doesn't come with a cable.
The whole E2E security debate is one that is guaranteed to get many excited, angry, and also tapping away furiously on their keyboards.
One of the few people I actually listen to about this is Mr @AlecMuffett and he's put together a pretty damn good video talking about this
There are many proposed solutions being offered to help with one of the use cases: child sexual abuse material and whilst that's a subject I've devoted a lot of time and research into, what is being proposed alarms me as it does break E2E
As Alec said, how can we actually test this?
He's made some really good arguments around this and if this is something that interests you, I'd urge you to watch the video.
I've already declared my love for eBPF and how it will change the detection landscape for containers and such. @chompie1337 has done one hell of a write-up about her journey writing an exploit for CVE-2021-3490
Exploit write-ups aren't new but what I really love and appreciate about Valentina's approach is that it's about the journey she took, what she learned and how she used that knowledge.
She even stated this as the start:
"I had no knowledge of eBPF going into this. My hope is that by sharing a PoC as well as my experience developing it, it can help others get started with eBPF exploitation"
So we get to learn as she did and by god that is something I love