wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Every body is beautiful

profile
Semin Bamte
May 21, 2022
0 Likes
0 Discussions
46 Reads

Her legs are longer, her smile is brighter and even her teeth are whiter. We've all been there before; you're looking through a magazine and as you see yourself, you feel depressed because your hips are just too wide, your skin too blemished and your lips too thin to ever be one of these women. But no one can be because they don't exist. OK, so yes, the models are real people, but the image of them is not. These images have been edited more times than your text message to that guy you really like. Yet, we are still encouraged, no, told by the media that this is how we should look. This is what is beautiful. And apps like 'FaceTune' target us, showing us that using their face editing app we too can acquire such looks. But what happens when the phone isn't there and you see just you in the mirror. Does it feel enough?

It should. Rather than blaming ourselves, starting crazy diets and cringing at every photo we're in, we need to stop trying to achieve these impossible standards of what is supposedly beautiful and embrace our own unique beauty. Beauty which means you may have got your big nose from your dad but it has been passed down from generation to generation like a family heirloom. Beauty which means a 'bikini body' is simply you in a bikini. Beauty which means you are not afraid to go out in the sun because it'll darken your skin, because this is part of who you are. And whether it's a freckle on your elbow or a birthmark on your back, it's almost like a physical stamp, your own personal trademark to say this is what makes me individual, what makes me, me! So, enjoy being you, smile at the world and let your unique beauty shine through.


Comments ()


Sign in

Read Next

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Operating Systems

Blog banner

Hacking of web server and application

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Basic Security For SOAP Services

Blog banner

Docker Framework

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Importance of Website

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

LISP - Library Management System

Blog banner

Synchronization

Blog banner

What your Favorite colour says about You?

Blog banner

BUFFER OVERFLOW_142

Blog banner

E-Cash (Electronic Cash)

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

In the world of Technology...

Blog banner

I/O Management and Disk Scheduling

Blog banner

Disk cache

Blog banner

Random Forests

Blog banner

Modern Operating Systems

Blog banner

Big Data Architecture

Blog banner

Caching windows

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

File management

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Assignment 2

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Mendeley (management software)

Blog banner

Threads

Blog banner

K-means use cases

Blog banner

Memory Management

Blog banner

Memory heirchy

Blog banner

RACI model in IT services

Blog banner

Measuring IT Risk

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Digital Marketing

Blog banner

How to write a cover letter

Blog banner

File management in os

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Operation system

Blog banner

Deadlock in operating system

Blog banner