Robin Kane-Kerby
@ladykirashka.bsky.social
200 followers 83 following 2.1K posts
I enjoy reading, writing, painting, singing, pets, witchcraft, essential oils, crystals, dragons, unicorns and many other things NOT tied to this 3D existence
Posts Media Videos Starter Packs
Also, how does GOOD news about this administration always manage to age like Limburger under a hot July sun? How's that peace in Gaza going? 🙄
Your Pope disagrees....Karoline, in fact he was quite clear that if abortion is not "pro-life" then neither is DJT's policy on immigration.

youtu.be/qASE4fgHs4M?...
Pope Leo criticizes Trump administration's immigration policies
YouTube video by WRAL
youtu.be
Not sure who the knuckle-dragger was, who was disrespectfully attempting to speak over the top of @jessicatarlov.bsky.social during her allotted time.
.
.
.
(Anchor babies? Racist much? What a tool.)

youtu.be/tOUNLIC7vno?...
Trump descends into FULL BLOWN PANIC over No Kings
YouTube video by Brian Tyler Cohen
youtu.be
Still shots from the #NoKings protests around the US today...thus far the largest PROTEST in US history...maybe he's a unifying factor after all, just not in the ways he thought!
*Yesterday, technically (sorry, just realized it was after midnight!)
Wichita, today’s the day — early voting is here!

Why wait until Election Day when you can make your voice heard starting now? Head to ksvotes.org to find your polling place and time, then grab a friend and vote early.

Every ballot cast moves Wichita forward. Let’s lead the way together.
allowing them to connect without the owner's knowledge. To protect against it, users should turn off Bluetooth when not in use, set their device to non-discoverable mode, keep software updated, and avoid pairing with unknown devices. (2 of 2)
Bluesnarfing - a type of cyberattack where a hacker uses a Bluetooth connection to gain unauthorized access to a device and steal information like contacts, emails, and photos. Attackers exploit vulnerabilities, especially when a device's Bluetooth is discoverable and not password-protected (1 of 2)
Leave devices with Bluetooth or Wi-Fi at home bc they can be hijacked. These attacks exploit vulnerabilities in the wireless protocols to steal data, gain control of the device, or install malicious software through methods like Bluesnarfing, Bluejacking, or accessing unsecured Wi-Fi networks.
They are monsters (allegedly)
🚨 I do not know when or where, but it doesn’t matter. This is depravity. This is a child. Those are state employed monsters. There is nothing normal about being “okay” with doing this job. 1/2