wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Every body is beautiful

profile
Semin Bamte
May 21, 2022
0 Likes
0 Discussions
46 Reads

Her legs are longer, her smile is brighter and even her teeth are whiter. We've all been there before; you're looking through a magazine and as you see yourself, you feel depressed because your hips are just too wide, your skin too blemished and your lips too thin to ever be one of these women. But no one can be because they don't exist. OK, so yes, the models are real people, but the image of them is not. These images have been edited more times than your text message to that guy you really like. Yet, we are still encouraged, no, told by the media that this is how we should look. This is what is beautiful. And apps like 'FaceTune' target us, showing us that using their face editing app we too can acquire such looks. But what happens when the phone isn't there and you see just you in the mirror. Does it feel enough?

It should. Rather than blaming ourselves, starting crazy diets and cringing at every photo we're in, we need to stop trying to achieve these impossible standards of what is supposedly beautiful and embrace our own unique beauty. Beauty which means you may have got your big nose from your dad but it has been passed down from generation to generation like a family heirloom. Beauty which means a 'bikini body' is simply you in a bikini. Beauty which means you are not afraid to go out in the sun because it'll darken your skin, because this is part of who you are. And whether it's a freckle on your elbow or a birthmark on your back, it's almost like a physical stamp, your own personal trademark to say this is what makes me individual, what makes me, me! So, enjoy being you, smile at the world and let your unique beauty shine through.


Comments ()


Sign in

Read Next

Image Steganalysis in Digital Forensics

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Game via listing method

Blog banner

Memory Management

Blog banner

Install Ubuntu Easily

Blog banner

Concurrency and Deadlocks

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Product Discount Calculator

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Security in Cloud Computing

Blog banner

Travelling blog

Blog banner

Deadlock

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

What is M-commerce and how it's work

Blog banner

Big Data Architecture

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

american greatines

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Starvation

Blog banner

Dancing Classes In Mumbai

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Understanding E-mail Servers

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

1.1 basic elements

Blog banner

From Model Mistakes to Metrics

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Modern operating system

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Depression

Blog banner

Network Forensics

Blog banner

Data Lake

Blog banner

Disk Scheduling

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Memory management and virtual memory

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

File system implementation

Blog banner

Privacy LAWs in IT

Blog banner