Posts by James Ross Kelly

Posts are meant to share an aspect of the universal Gospel of Jesus Christ, the Son of God. James Kelly is a Christian seeking the Mercy of God (i.e., His Goodness and Loving Kindness) and daily more of the Grace of His Holy Spirit. Posts of other authors are meant for review of salient points made by said authors and are credited and meant to share light with others and encourage others to read their works, and when possible, by providing links to where their works may be purchased.

A Love Stronger than Fear by Rachel Pieh Jones

Rachel Pieh Jones tells the story of Annalena Tonelli. Amid a volatile mix of disease, war, and religious fundamentalism in the Horn of Africa, what difference could one woman make? Annalena Tonelli stayed anyway – and found a way to beat tuberculosis, history’s deadliest disease.

Source: A Love Stronger than Fear by Rachel Pieh Jones

Jesus Would Have Been the Worst Conservative Christian |

For one, Jesus was never like, “Do you know where you are going when you die?” You know, the number one question of American Christianity, the question […]

Source: Jesus Would Have Been the Worst Conservative Christian | Jesus Would Have Been the Worst Conservative Christian

The Bible may have a naming discrepancy, in the Gospel of John– The Chronicle

“You cannot have an entire discipline, especially the discipline that determines what the text of the Bible is, to all be men.”

Source: The Bible may have a naming discrepancy, and a Duke researcher plans to correct it – The Chronicle

What today can the government do to your phone and your laptop?– Edward Snowden On Trump, Privacy, And Threats To Democracy | The 11th Hour | MSNBC – YouTube

18:28: Brian Williams: What today can the government do to your phone and your laptop the phone and laptop of any American what’s the extent of the government’s reach if they’re determined to reach into your life?

Edward Snowden: …. I’ll try to summarize hacking has
increasingly become what governments
consider a legitimate investigative tool.
They use the same methods and techniques
as criminal hackers and what this means
is they will try to remotely take over
your device. Once they do this, by
detecting a vulnerability (and in the
software that your device runs such as
Apple’s iOS or Microsoft Windows), they
can craft a special kind of attack code
called an exploit. They then launch this
exploit at the vulnerability on your
device which allows them to take total
control of that device. Anything you can
do on that device the attacker (in this
case the government) can do. They can read
your email,
collect every document, they can look at
your contact book, they can turn the
location services on they can see
anything that is on that phone instantly,
and send it back home to the mothership.
They can do the same with laptops. The
other point that we forget so frequently
is that in many cases they don’t need to
hack our devices, they can simply ask
Google for a copy of our email box
because Google saves a copy of that.
Everything that you’ve ever typed into
that search box Google has a copy of
every private message that you’ve sent
on Facebook. Every link that you’ve
clicked everything that you’ve liked
they keep a permanent record of, and all
of these things available not just to
these companies but to our governments,
as they are increasingly deputized, as
sort of miniature arms of government.

Brian Williams: What about enabling your microphone

Edward Snowden: If you can do it, they can do it.
It is trivial to remotely turn on your
microphone, or to activate your camera so
long as you have systems-level access. If
you had hacked someone’s device remotely,
anything they can do, you can do, they can
look up your nose right? They can record
what’s in the room the screen may be off
as it’s sitting on your desk, but the
device is talking all of the time. The
question we have to ask is who is it
talking to? Even if your phone is not
hacked right now, you look at it it’s
just sitting there on the charger, it is
talking tens or hundreds or thousands of
times a minute, to any number of
different companies, who have apps
installed on your phone it looks like
it’s off, it looks like it’s just sitting
there, but it is constantly chattering
and unfortunately like pollution we have
not created the tools that are necessary
for ordinary people to be able to see
this activity. And it is the invisibility
of it that makes it so popular in common
and attractive for these companies
because if you do not realize they’re
collecting this data from you, this very
private and personal data, there’s no way
you’re going to object to it.

The Things George Washington Worried About are Happening Today – HISTORY

“The unity of government which constitutes you one people is also now dear to you. It is justly so, for it is a main pillar in the edifice of your real independence, the support of your tranquility at home, your peace abroad; of your safety; of your prosperity; of that very liberty which you so highly prize…it is of infinite moment that you should properly estimate the immense value of your national union to your collective and individual happiness; that you should cherish a cordial, habitual, and immovable attachment to it; accustoming yourselves to think and speak of it as of the palladium of your political safety and prosperity; watching for its preservation with jealous anxiety; discountenancing whatever may suggest even a suspicion that it can in any event be abandoned; and indignantly frowning upon the first dawning of every attempt to alienate any portion of our country from the rest.”

Source: The Things George Washington Worried About are Happening Today – HISTORY