The construction of a hiking path depends on the environment and budget. There certainly is membrane used in some, especially in wet/boggy environments. I think it's mostly gravel that's used to prevent grass from growing. (people don't walk on the entire width of the path usually)
I think it's worth trying putting the link in the post body. Mastodon might generate a preview image with it.
Another option would be creating the posts on mastodon, and mentioning the lemmy community. The KDE community uses this method for their announcements. Example: https://lemmy.world/post/27768851
Kate (and now Kdevelop) support LSPs, so you should get the same autocomplete experience as VS code.
Note that some LSPs are not what I would call lightweight. You might have a lighter experience using Kdevelop's python support, rather than an LSP for example (I've not tested though). Or research to see if alternate LSPs are available for a language.
From what I can tell, raylib is just a library? In which case it should work with any autocomplete (Kdevelop or LSP) for whichever language you use.
Kate includes many default LSP configurations, and links to their download pages in it's LSP settings. LSPs may also be available in your system's package manager.
My Linkedin has a permanent Emails aren’t getting through to one of your email addresses. Please update or confirm your email. message. Linkedin knows my email doesn't work. It shows an "x Email not reachable" in the settings page as well. But as soon as I click "Add email address"... We sent a code to your email. WHY? it's bizarre.
As a 23 yo who is mostly surrounded by people aged 50-80, you still have a good few decades left. Some people in their 70s treat life like a 30 yo would.
I've been using mailbox.org for a while, and I'm happy with it. It costs 1€ per month at it's lowest. They have also been developing an open source video conferencing thing (included in the 1€), which from my experience is much better than jitsi.
If an attacker gains access to your password, maybe through a keylogger or browser extension, the TOTP code will expire after a minute, and the attacker won't be able to log in later.
Using 2-factor authentication (in general) allows you to keep your login information on 2 separate devices, such as using your computer to store passwords, and your phone to generate TOTP codes. Most people (me included) will probably use 1 device for both though.
I read the title as a programming question at first...