In reality, we were not drawn to Covert Cafe by promises of vegetarian food but by Vanfoodster's Cinnamon Bun Challange (a summary of which will be our next posting before the end of the month).
I have only been to Deep Cove a couple of times before but it is a picturesque little community at the south end of Indian Arm. Once you get into town it is not hard to find Covert Cafe (despite the name) as there is basically one main road leading to the waterfront. I am kind of wishing that I had taken a picture of the front of CC that puts it more in the context of this charming village (try Street View!).
It was almost lunchtime and we were feeling a bit peckish when we arrived so rather than head straight to dessert, we decided to try a Vegetarian Panini. This was a really good sandwich! Spinach, red bell peppers, and artichoke as well as melty gruyere on some nice grainy bread!
They have a number of tempting baked treats to offer here and we decided to try one of their Fudge Brownies. It was rich and delicious. We were a little thrown by a greenish mark on the bottom (we knew it wasn't anything bad) that turned out to be an M and M which they have included in the recipe! Nice idea!
And finally came the main event! With cinnamon buns timing is everything! Fresh from the oven this not small bun was full of warm melty cinnamon sugar and cream cheese icing. It was nothing short of amazing! I am still wrestling with whether this is #1 or #2 in the challenge but for the record, Mharie picks it as #1!
This tiny charming cafe has only one table open these days (and a couple of outside tables if the weather suits) but most people came in to get their goodies (and frankly really good coffee) to go. The washroom was not working which was more than a little bit inconvenient but there is a public washroom in the park not far away.
Our baker's grandmother who came from Italy has been the inspiration for all that you can enjoy here and you can read their story on the Covert Cafe website. The folks who run the place were very friendly and responded enthusiastically to our interest in their craft.
Food 4 out of 5
Comfort 3 out of 5 (the washroom thing)
Service 4 out of 5
Value 4 out of 5
Great Article. Thank you for sharing! Really an awesome post for every one.Argos SurveyReplyDelete
RECOVERY OF LOST FUNDS (BINARY OPTIONS, BITCOINS, LOAN SCAM).ReplyDelete
THINGS YOU NEED TO KNOW ABOUT THE GLOBALKOS C.E.H RECOVERY COMPANY.
Hiring a professional hacker has been one of the world most technical valued navigating information. High prolific information and Privileges comes rare as it has been understood that what people do not see, they will never know.
Welcome to the Global KOS hacking agency where every request concerning lost funds are recovered within a short period of time.
The crucial benefit of contacting The Global-KOS hackers is
• ZERO TRACES: After a successful hack recovery is carried out by the Global-KOS, no active or passive attacks will be used to trace any of our hacks to our clients or our organization. One common practice that attackers employ to evade detection is to break into poorly secured systems and use those hijacked systems as proxies through which they can launch and route attacks. Attackers effort on this platform are useless because we use a strong proxy firewall switching and a firm security system to prevent unauthorized bodies from tracking or modifying our network accessible resources. I.e the hacker and clients are 100% safe and anonymous.
ADVANTAGE TO CLIENTS:
• REPEAT CLIENTS and SERVICES: E.g, after helping a client recover all money lost to fraudulent practices, most of this clients comes back requesting we provide the same service in disguise as another person. We found a way to issue serial Numbers to each clients who seeks our help and services for identification purposes because we are not interested in your names nor location. But we urge that individuals shouldn't abuse this opportunities as we have provided value to you.
However, on this platform of recovery, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web protocol. The operation of these hackers is to potentially deploy a distinguished cyber security technique to retrieving back the victims stolen funds via the application of a diverse CM breacher which enables you to track the data location of a scammer and extract every data on the con database. This is achieved using the systematic courier tracking method.
Which of the uneasy situation do you find yourself in right now?
✅(BITCOIN INVESTMENTS, BINARY OPTIONS OR LOAN SCAM?
This shocking study points to one harsh reality we all face today. It saddens our mind when a client expresses annoyance or dissatisfaction of unethical behaviors of scammers. We have striven to make tenacious efforts to help those who are victims of this fleas get off their traumatic feeling of loss.
The company is large enough to provide comprehensive range of services such as.
• MOBILE PHONE HACKS.(Catching A Cheating Spouse)��
• CREDIT SCORE UPGRADE,
• PENETRATION OF WEBSITES AND DATABASE.
• UNLOCKING FROZEN CRYPTO WALLET��
• EMAIL HACKS
• HACKING A FRAUDULENT WEBSITE.��
• UBER FREE PAYMENT LICENCE.��
For prolific services and info,