danidee
10,000+ Views

Study: Cinderella's Glass Slipper Has Been Scientifically Disproven.

Warning: If you haven't seen the movie 'Cinderella' before, be warned - there's about to be some spoilers. For everyone else, just some swift crushing of childhood dreams.
This week, a scientific study published by the University of Leicester's Department of Physics and Astronomy proved that Cinderella's glass slipper - you know, the one she wore to the ball - would have been completely unusable.
Yes, the shoes you've seen her box-stepping with Prince Charming at the ball in would have shattered the instant that she tried to walk in them - which would have made it impossible for her to move around in. (But much easier to be found, right? I mean, all you'd have to do is follow the bloody footprints. Just kidding. That's gross.)
The team determined this by making some assumptions about the storybook character and the shoes that she wore that night. To give the story the benefit of the doubt, they took down her shoe size as a size 6, the smallest of women's average shoe size range. They also decided that her shoes were made out of soda lime glass, the most commonly used glass material.
They then move into some pretty intense math before concluding that, even if Cinderella was an extremely slim girl, she would only be able to stand in her heels - not run or walk in them like she does in the story. If she were to move around in them, the heel have to be 1.15 cm - less than half an inch - which certainly wasn't the case in the fairy tale's many film adaptions.

Do you think the study is valid, or was the Fairy Godmother just that good at making shoes? How does it feel to having scientists tell you that fairy tales lie?

Let me know in the comments below, and for more strange (but true!) science and technology news, follow my Weird Science collection!
50 Comments
Suggested
Recent
I just always assumed the glass was magic
it wasnt glass, it was the representation of her hopes in dreams finally being revealed to all 😍😍😍
They should get a nobel price coz this proves only one thing-Scientists are the craziest creatures ever existed.
to hell with science. the slippers were magic duh! why prove something as meaning less as that anyway? no one really cares tbh. sorry
the slipper would have been gone at midnight anyways, that's what I never understood, dress, carriage, and even the other slipper turn back into what they were but that one slipper never does.
Cards you may also be interested in
Here's The World's 10 Most WTF?! Aphrodisiacs.
So, I'm not here to give you guys the birds-and-bees lecture, but as many of you probably know, sex is pretty important and has been since the beginning of humankind. (That is, after all, how we all got here, right?) So because of all this, knowledge about aphrodisiacs - aka the foods, drinks, etc. that gets us biologically 'in the mood' - have been passed down from generation to generation, with each culture having their own idea of what the most effective accomplice to your baby-making could be. Some of them - like oysters, chocolate, and red wine - are pretty popular mood makers here in the US. But what does the rest of the world reach for when their pheromones need pumping? Well, you might be a little surprised. Baboon Urine Region: Zimbabwe I'm not saying you should go drink pee, but when mixed with beer, baboon urine is believed to enhance fertility AND fidelity. Donkey Milk Region: Middle East Thanks to Ancient Rome's influence, certain Mideast villages swear that bathing in donkey milk (or rubbing it on, uh, very specific body parts) helps with sexual virility. Snake Wine Region: Vietnam Rice wine steeped with snake might not be appetizing for you, but in Vietnam, this medicinal aphrodisiac gets the job done. Balut Region: The Philippines I'm just going to put it out there. There's something awkward about eating a duck fetus to help you create a fetus of your own. Bird Nest's Soup Region: China This soup, made with swallow's nest, is among the world's most expensive dishes. For that kind of money, it'd better work! Leafcutter Ants Region: Colombia Often toasted before they're served up, this folk aphrodisiac is a top choice of Colombia's Ghane Indian tribe. Mm-mm-mm. Wolf Meat Region: Mongolia Apparently, in parts of Mongolia, getting hungry FOR the wolf will get you hungry LIKE the wolf. (If you get what I'm saying.) Casu Marzu Region: Italy So are the live maggots inside Sardinia's regional cheese also turned on, or is that just supposed to be a human thing? Spanish Fly Region: Southern Europe When men consume this popular (but kind of gross) aphrodisiac, they get MORE virile, and when women do, it can actually cause fertility issues. Tiger Penis Region: Southeast Asia According to Chinese medicine, tiger penis is supposed to help get you in the mood. But do we really need to be killing tigers just to get it on? Really, people?! So there you have them: 10 of the weirdest folk aphrodisiacs in the world. Try them if you dare. (And if you do, try not to eat them in public, okay? No need to get all 'When Harry Met Sally' on everyone.) Have you heard of any other aphrodisiacs? Do you believe aphrodisiacs work? Let me know in the comments below, and for more strange (but true!) stories of love, follow my Crazy Stupid Love collection!
RM Meme Madness Monday’s!!🤣😂
Hello ARMY!!💜 It’s Yugykookie97!! We are finally starting our weekly schedule! This week is RM! Each day has different themes! After this week is over we will be posting for Jin! I hope you all enjoy what we have planned! ❤️ 💜 ❤️ 💜 These memes had me cracking up😂🤣 *credit to the owner of the memes* ❤BANGTAN ARMY TEAM❤: @Yugykookie97 @Mochiroon @QueenPandaBunny @MelissaGarza @HUMANWIZARD @agustdsaveme @chimchimsjams @kaylenne956 @kpopfan88 ❤ARMY TAGLIST❤: @amandamuska  @blessowmwago @BoyGroupKpop @Bxbybri @CleafeMaeObina @coolwolf13 @dalenalw @echoxsoul  @gabstar143  @Gracebug @HannahC19 @herreraletecia  @HomegirlG  @ifitnessvn @Ilovephases @izzybell1202 @jennyfer1111r1 @jiminiebae @jungkookieeeee @Just2BLoved @kaylawalker929  @kaylenne956 @krissynormam @kpopfan88 @MelissaGarza @Mochiroon @Nyxxonn @PANDABTS @QueenPandaBunny @rebeccariley52 @rodrickagardne @Rose2demhaters @samcorsam @simpsonsamantha @Shelbeigh19 @shellyfuentes70 @Starbell808 @szewwy @Taekookimonster  @Tiffiedannie @wolfyplayzyv @yukigintokie    *let me know if you want to be apart of the ARMY taglist* K-Monsta Squad: @Yugykookie97 @BBxGD @lilbr0wneyes @DefSoul1994 @KpopGaby @MYAlpha @BangtanGirlOT12 Tag List: @cagonzales9696 @MonieManhiM @cherriblossom17 @SimplyAwkward @Btsislife @jaselgalindo @emealia @saraortiz2002 @xsandos17 @VictoriaBossier @TaehyungKey @Sarahdarwish @kpopandkimchi @Emealia @terenailyn @MonAnnahiX @4dalientae @PrettieeEmm @kyokeo @KwonOfAkind @AnimeKpopLover @SugaOnTop  @QueenyCrossGene @MadAndrea @B1A4BTS5ever @zyxzj @Taehyungie @VKookie47 @NuXX @Baekyeol27 @DOislifeExoL @kpopbeat @BulletproofV @PrincessUnicorn @luna1171 @LisetteZapata @herreravanessa9 @MadAndrea @AnimeKpopFreak @amandamuska @RandomName @aliendestina @mrsyookihyun @MaelstromVIP @Foxxyjinxx @Bangtanss @YessicaCardenas @JadeOwens @cns1391 @JJiBin @TheEnlightment @BlueMoon201 @QueenPandaBunny @emberreynemoll @LacyTanner @nyxxonn @SweetDuella @MmIlk @KihyunA @ARMY4Life @SerenaArthurs @Additional18 @jessicaclove  @olive07354  @YungStatin  @nickij @Mochiroon @LiyahBoon @BoyGroupKpop @blessowmwago @Lesha *Let me know if you want to be tagged or untagged from the tag list*
DIGITAL FORENSICS: KEY SKILLS OF A CERTIFIED INVESTIGATOR
The terms ‘forensics’, ‘digital forensics‘, ‘computer forensics‘, or ‘cyber forensics’ gives the impression of law enforcement. Whereas, in reality, digital forensics plays an important role in cybersecurity. Digital forensic is an independent team of cyber forensic is an expertise similar to other cybersecurity teams. Proficient standards to be a certified cyber forensic investigator Owing to a continuous demand for digital forensic training by the companies, appreciable number of certifications are available. Employers preferably look for certified forensic investigators having key-skills on digital forensic. The most common standards that a certified digital forensic investigator should have are as follows: “Practitioners require technical and professional training in digital forensics principles and processes.” – Jason Jordaan, principal forensic scientist at DFIRLABS, at the ITWeb Security Defeating anti-forensics techniques Computer forensic tools allow cyber forensic investigators to retrieve deleted files. On other hand, anti-forensic tools do the reverse. Anti-forensic tools and techniques work against cyber forensic tools. The anti-forensic tools alters, hides, or deletes the information. Anti-forensic tools also implicate users by introducing fake evidences, or by exploiting bugs in the tools, and more. A digital forensic investigator is the one who should have the knowledge and skill to identify and mitigate anti-forensic tools and techniques. Understanding hard disks and file systems Hard disk and internal files serve as important sources of information to the forensic investigator. Hence, an investigator should be aware of behavior and structure of hard disk. A cyber forensic investigator should be able to retrieve, protect, and store the information from the hard disk drive. The procedure of file system is also important during investigation as it relates with the hard disk again. Operating system forensics Operating system forensic is the process of identifying evidences from the operating system. It involves extracting and analyzing information from the operating systems of any device. The common operating systems like MAX, Windows, and Linux are usually targeted for criminal activities. A cyber forensic investigator should have a complete knowledge of these systems to trace the cyberattacks. Investigating email crimes Due to large dependency on the electronic communication channels, email has evolved as a preferred source of communication. The reliable nature of emails has become a powerful tool for criminals. They use emails to perform phishing and other common cyberattacks in large volumes. Regional laws govern email crimes except those that are agreed globally. The trailing emails can be a great source of information to the forensic investigators. Cloud forensic Cloud computing is an emerging technology, which many organizations are adopting the trend. On another hand, due to their potential repository of data, attackers perpetrate various attacks. The attackers make their attempts continuously to gain anonymous access over the cloud networks and retrieve the information. A cloud forensic implies the application of forensic investigation in a cloud environment. The cloud network involves both public and private networks. A digital forensic investigator is well-versed with cloud forensic to get through the investigation process. Dawie Wentzel, Head of Cyber Forensics Investigation at Absa Group has shared immense information on the latest tools and methods to collect cloud-stored data in accordance with evidentiary requirements. During his webinar via Cyber Talks, Dawie talked about the numerous challenges of legally obtaining cloud-stored electronic evidence and possible solutions. Watch the full Cyber Talk here: https://www.eccu.edu/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps/ Mobile forensics Mobile device forensics is the process of recovering digital evidence from mobile phones during the investigation process. A certified digital forensic investigator can examine and report possible digital evidence sources from mobile phones. The investigator collects the evidence to present in the court of law. The certified forensic investigators analyze the mobile phones for message history, call history, pictures, or other data on the memory to trace the perpetrators of crimes. The Computer Forensic Hacking Investigation (C|HFI) is a recognized certification on cyber forensic from EC-Council. The certification validates the candidates’ skills in identifying perpetrators’ footprints and gather the evidence to produce in the court of law. C|HFI is a vendor-neutral certification that fortifies the application knowledge of law enforcement personnel, security officers, military personnel, system administrators and everyone concerned of the integrity of the network infrastructure.