cultural reviewer and dabbler in stylistic premonitions
- JumpNSFW
CW: Body shaming
- JumpDeleted
Permanently Deleted
Science Memes @mander.xyz You don't have to use gyroelongation
United States | News & Politics @lemmy.ml We Found More Than 40 Cases of Immigration Agents Using Banned Chokeholds and Other Moves That Can Cut Off Breathing
United States | News & Politics @lemmy.ml ICE Now So Hated Even Their Own Agents Are Terrified
Wikipedia @lemmy.world Lidice massacre
technology @hexbear.net How commercially-available phone location data is used by ICE (and other law enforcement agencies)
privacy @lemmy.ca How commercially-available phone location data is used by ICE (and other law enforcement agencies)
Privacy @lemmy.dbzer0.com How commercially-available phone location data is used by ICE (and other law enforcement agencies)
Privacy @lemmy.ml How commercially-available phone location data is used by ICE (and other law enforcement agencies)
The Onion @midwest.social Melting Ice Caps Expose Hundreds Of Secret Arctic Lairs
United States | News & Politics @midwest.social Videos Contradict Trump Administration Account of ICE Shooting in Minneapolis
United States | News & Politics @lemmy.ml Videos Contradict Trump Administration Account of ICE Shooting in Minneapolis
World News @lemmy.world Danish soldiers ordered to fight back if US invades Greenland, Copenhagen confirms
World News @lemmy.ml Danish soldiers ordered to fight back if US invades Greenland, Copenhagen confirms
United States | News & Politics @lemmy.ml Rep. Kelly announces plans to impeach Secretary Kristi Noem
Wikipedia @lemmy.world Killing of Renee Good
World News @lemmy.ml Claudia Sheinbaum: Cooperation Yes, Intervention No
Not the Onion @lemmy.ml A conservative think tank is suing Oregon over a new law that makes it illegal to impersonate a union representative
Cybersecurity @sh.itjust.works "MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easier
Security @lemmy.ml "MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easier
Security @lemmy.ml Bluetooth Headphone Jacking: A Key to Your Phone















i searched for the username; the tweet is from ~42 hours prior to this lemmy post.