Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Gasshog; SheepWhisperer; numberonepal; Keflavik76; reasonisfaith

In a very oversimplified sense, a modern computer’s operating system (OS) brings computer hardware “to life.” (I used to design and program operating systems in the early ‘70s and have kept somewhat abreast of the goings-on surrounding AI since then.)

You may already know that the RedMound god, Macrohard (MHD) keeps track of a “fingerprint” of the machines licensed to run (for example) their Losedoze OS. If a user significantly changes the configuration of his machine (or clandestinely attempts to run the same licensed OS on a nearly identical machine), MHD will detect that and may force the user to confirm that there doesn’t exist a variant of the original machine that is trying to run under the same OS license, not legitimately purchased, while the original machine would implicitly retain its license to run the OS as well. Normally, the licensee will affirm that the detected hardware change has indeed been made without there having been an attempt to create a nearly-duplicate machine hardware running a second copy of the OS under the original license. (Mt. 13:24-30)

Similarly, a hacker (witch/sorcerer as in Deut. 18:9-14) that duplicates the fingerprint and MHD license number (DNA) of that MHD-OS-running machine—even one that may have been recycled—could supply hardware (nearly) identical to the original and load a copy of that MHD OS/software on that hardware. (Note, a yet-to-be-licensed, would-be OS user that presents an invalid license code will be immediately detected and typically is given an error message that doesn’t allow a clear theft to proceed. Upon detection of a duplicated, otherwise valid license code, MHD COULD immediately exact all manner of retribution mayhem onto the hacker’s machine, but in the present computer business environment, MHD is unlikely to risk an actionable PR nightmare for a single, fairly insignificant theft. Don’t be mistaken, however, to think MHD’s eyes are blind to any such counterfeiting. Fraudulent OS use would only be allowed to continue by the grace of MHD, though in a sense that is analogous to the spirit world, it would appear some persons “unauthorized by MHD” have a capacity to “call up” dead things (Deut. 18:11c).

OTOH, if the hacker goes professional or starts loading dozens of machines shipped from a company with serious assets and/or has its own PR with which to be reasonably concerned, such activity will be shut down without delay by any reasonable company management. Keep in mind the Deuteronomy verses cited above.

If a human would attempt to present fraudulent “OS” credentials for a cobbled-together meat sack (Umberto Ecco, The Name of the Rose reference) God will have already known the human’s intentions. He’s made clear in Deut. 18:14 what “The Lord your God has not allowed you to do.”

While speaking in his first book to the Christians at Corinth, the Apostle Paul told them (6:19f) that their “hardware” was the temple of the Holy Spirit and that it (legitimately and uniquely) was bought with a price. Doubtless the accuser fancies himself a powerful “hacker,” but a spirit, archangel or demon that is not the Holy Spirit should not consider he ultimately will end up doing anything other than that which is described in Rev. 20:14 and 21:8.

“For as the heavens are higher than the earth,
So are My ways higher than your ways
And My thoughts than your thoughts. Isaiah 55:9


578 posted on 02/07/2022 4:44:27 PM PST by rx (Truth will out!)
[ Post Reply | Private Reply | To 521 | View Replies ]


To: rx

Your analogy between hacking and sorcery is fitting.

Though I’d say on a Biblical level, this sorcery does not take place within the world of information technology, but is projected out of it.

Technology itself is the virus, the means by which the enemy attempts to hack into God’s creation.


617 posted on 02/07/2022 6:32:12 PM PST by reasonisfaith (What are the cosmological implications if the Resurrection of Christ is a true event in history?)
[ Post Reply | Private Reply | To 578 | View Replies ]

To: rx
I've upgraded many machines and had to get the nod from the RedMound god to achieve functionality.

Nice metaphor. 

The Greek word “pharmakia” literally means “drugs”, and appears five times in the New Testament: in Gal 5:20, Rev 9:21, 18:23, 21:8, and 22:15. “Pharmakia” is translated into our English Bible as either “witchcraft” or “sorceries”. We also get our English word “pharmacy” from the Greek word “pharmakia”.

623 posted on 02/07/2022 6:52:15 PM PST by Keflavik76 (Don't want to be a brick in Babylons wall.)
[ Post Reply | Private Reply | To 578 | View Replies ]

To: rx
(I used to design and program operating systems in the early ‘70s...

what systems ?
786 posted on 02/08/2022 10:19:52 AM PST by stylin19a (I am not fat ! I'm just easier to see.)
[ Post Reply | Private Reply | To 578 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson