chevronLeft icon back
Matthew holding teacup, giving side eye.

Ask A White Man

Straight, direct, bespoke insights from a well-adjusted, fashionable man living in a gentrified American city.

Who is Matthew?

Matthew might look like he's scowling but he's actually feeling alright. He has thirty-two years of experience living as a cis male man. He once impulse bought an $800 leather jacket and recently tried wearing dresses. In a former life he had an immaculate collection of vintage boutique clothing, which he narrowed down to a set of outfits he could wear routinely.

Matthew sometimes forgets to eat, but when he does he picks something delectable. He has made a lot of money and very little money, and takes pleasure in decorating and cleaning his tiny apartment.

Matthew finds it hard to connect with men due to his disdain for sports and boasting, but has tried using Bumble to find guy friends. He has always been feminine. He likes to blow bubbles in milkshakes and bob up and down when he finds a bouncy seat at the bar.

On Saturday afternoon you may find Matthew bursting into laughter while reading bodybuilder forums or driving around Los Angeles while listening to Bobby Brown. Matt has a penchant for discussing relationship problems. He has a delightfully high pitched giggle and sweeps his hair back in a demure way when he's talking. He can see the good in the bad and the bad in the good, and will always offer his most honest, blunt opinion.

Ask A Question

Learn From Matthew






Terms & Conditions
General

These Terms of Service ("Terms") govern your access to and use of our service. By using the Services you agree to be bound by these Terms. To use our Service, you must provide your email address ("Email"). You agree to provide us with an accurate Name and valid, complete and updated information for your Email. We may need to use this information to contact you. By using our internet service, you hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation, interception of transmissions, loss of data, and the introduction or vruses and other programs that can corrupt or damage your computer. Your access to and use of the Services or any Content are at your own risk. You understand and agree that the Services are provided to you on an “AS IS” and “AS AVAILABLE” basis.

Content on the Services

You are responsible for your use of the Services and for any Content you provide, including compliance with applicable laws, rules, and regulations. You should only provide Content that you are comfortable sharing with others. Any use or reliance on any Content or materials posted via the Services or obtained by you through the Services is at your own risk. We do not endorse, support, represent or guarantee the completeness, truthfulness, accuracy, or reliability of any Content or communications posted via the Services or endorse any opinions expressed via the Services. You understand that by using the Services, you may be exposed to Content that might be offensive, harmful, inaccurate or otherwise inappropriate, or in some cases, postings that have been mislabeled or are otherwise deceptive. All Content is the sole responsibility of the person who originated such Content. We may not monitor or control the Content posted via the Services and, we cannot take responsibility for such Content.

Limitation of Liability

Accordingly, you agree that the owner and/or provider of this website is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, emotional repercussions, hacking or damage to your computer or other devices that result from the transmission or download of information or materials through the internet service provided.

Use of the wireless network is subject to the general restrictions outlined below. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, the network provider reserves the right to permanently disconnect the offending device from the wireless network. If you don't agree to all the terms in this Agreement, you may not use or access the Services.

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's privacy.
  2. Intellectual property right violations - Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
  3. Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
  4. The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
  5. Export Control Violations
  6. Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
  7. Uttering threats;
  8. Distribution of pornographic materials to minors;
  9. Child pornography.
Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  1. High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents)
  2. Obscene or indecent speech or materials
  3. Defamatory or abusive language
  4. Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
  5. Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
  6. Facilitating a Violation of these Terms of Use
  7. Hacking
  8. Distribution of Internet viruses, Trojan horses, or other destructive activities
  9. Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
  10. Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate these Terms of Use, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
  11. The sale, transfer, or rental of the Service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
  12. Seeking information on passwords or data belonging to another user.
  13. Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.
  14. Intercepting or examining the content of messages, files or communications in transit on a data network.

 I am not an asshole. By checking this box I agree to the Terms of Service