My wife and I are launching a new business and this week is menu prep and creation. Takoyakis made with proper Katsuobishi and Nori.

All hand made and yeah I think these will be popular Image
Second menu option testing. Chicken laksa curry learned from our time living in Singapore. We struggle to get a proper laksa here in London so time to change that. Image
Our take on a Malay/Singaporean classic Image
When making the paste, it's the combination of the lemon grass, coconut milk, tumeric and most importantly the umami (5th taste) for which shrimp paste does the job. So we tried to find a vegetarian/vegan option and I think our nori sheets from the takoyaki could add the alt
We are hoping to make all dishes available in vegetarian/vegan too, something that's missing a lot with delivery food these days

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Daniel Cuthbert

Daniel Cuthbert Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @dcuthbert

4 Aug
Mr @pwnallthethings on supply chain issues.

1: is it getting worse or not?

Well here's the number of 0hdayz being used Image
Why? well many players have taken their gloves off. It is hurting our ability to respond.

Govs be gov, spies be spying and want actional intel. Ransomware groups want C.R.E.A.M

They all want to do it at scale for minimal outlay
there's always a cost Image
Read 13 tweets
3 Aug
When software nerds get into tuning and hacking older ECUs. One of my plans for the Lancia Delta is to fully understand the Magneti Marelli/WEBER ECU.

I'm going down the hardware route, but found out yesterday that someone went down the software route and made something amaze Image
A fully functional L8 emulator that includes a full disassembler and assembler for both the Motorola 6803 and 68HC11 microprocessors so all code written for these chips may be analysed and modified. Image
You can even load factory maps or custom ones Image
Read 6 tweets
1 Aug
It's a Sunday.
Kids are playing Lego
Wife is chilled

Guess this means it's teardown and tinker time with IKEAs indoor pollution sensor
Ok it's pretty well-designed. David Wahl is the designer, who's responsible for a lot of pretty damn good designs. Has usb-c to power but doesn't come with a cable.
Inside the beast.
Read 21 tweets
30 Jul
Next week it's hacker summer camp and the research on show both at @BlackHatEvents and @defcon is pretty damn sweet.

There's a lot of *really* good talks being given, but some have the potential to make things interesting given the subjects of the research.
First up is @pwnallthethings's keynote

blackhat.com/us-21/briefing…

I'm looking forward to this a lot.
Then @orange_8361 is kinda just being @orange_8361 and this talk is gonna be something else. I won't give any of it away but wow...

blackhat.com/us-21/briefing…
Read 7 tweets
30 Jul
The whole E2E security debate is one that is guaranteed to get many excited, angry, and also tapping away furiously on their keyboards.

One of the few people I actually listen to about this is Mr @AlecMuffett and he's put together a pretty damn good video talking about this


There are many proposed solutions being offered to help with one of the use cases: child sexual abuse material and whilst that's a subject I've devoted a lot of time and research into, what is being proposed alarms me as it does break E2E
As Alec said, how can we actually test this?
He's made some really good arguments around this and if this is something that interests you, I'd urge you to watch the video.

The duck method has wings I feel Image
Read 6 tweets
30 Jul
I've already declared my love for eBPF and how it will change the detection landscape for containers and such. @chompie1337 has done one hell of a write-up about her journey writing an exploit for CVE-2021-3490
Exploit write-ups aren't new but what I really love and appreciate about Valentina's approach is that it's about the journey she took, what she learned and how she used that knowledge.
She even stated this as the start:

"I had no knowledge of eBPF going into this. My hope is that by sharing a PoC as well as my experience developing it, it can help others get started with eBPF exploitation"

So we get to learn as she did and by god that is something I love
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(