top of page
Search

Hacking the Gospel

Writer: ldsanonldsanon

Imagine a vast, secure network,

Connecting many users

Across a common domain

To a central server in the Home Office.

The Builder of the network thereby

Enabled a great work to go forth

That permitted users to obtain

Great knowledge and truth,

By which users could guide their lives

Toward joy and fulfillment.


Imagine a team of administrators

Who were given authority by

The network builder,

To preserve and protect

The network.

Imagine that, one by one,

The administrators of the network

Were eliminated.


Now, imagine a hacker,

Who compromised one user’s account,

Then another,

and ultimately many.

The hacker convinced others,

To listen no longer to

The counsel of

The system administrators.

The hacker convinced them to neglect

And ignore new updates

From the legitimate system administrators.

Instead, the hacker

Provided updates that were not

Designed or authorized

By the Builder.


Imagine that, after a time,

The hacker convinced many

That he was the real system administrator.

The hacker persuaded many

To disconnect their computer

From the true, authentic domain

And to connect to another one.

The new network looked almost

Like the original one, but it

Lacked the most important features.

Still, it seemed familiar and useful to those who

Regularly logged onto it.


Eventually, nobody was connected to

The Home Office anymore.

Even though it was still there.

It was still transmitting, but

Nobody was listening.

Over time, new hackers arose and

Hacked the hacker’s network

Again and again.


Eventually, there were over 3,000

different networks,

All claiming to be connected to the Home Office,

But really,

None of them were.

They had lost the knowledge

Of how to connect to

The original network.

They no longer had the passwords

And they didn’t know the address

Of the correct servers anymore.

Some of the networks were small and

Some were very large,

But none of them could connect back to

The original network.


Imagine that, after many days

And weeks and months, and years

The Builder of the Network

Hired new network administrators

To show how to reconnect

To the original, true domain.

That is what the Builder did.

The Builder gave the new administrators

The network diagrams, passwords, and

The authority to act in his name.


Imagine that the new administrators

Began to announce

The restoration plan,

But they found there was a lot of opposition.

The hackers (and there were many by now)

Did not want to lose their customers

And they did not want to lose their employment.

(For their networks paid them well!)

The hackers published false and spurious information

About the administrators and the restored network.

They convinced many to stay put and

To disparage those who considered trying out

The restored network.

They convinced many that their network

Was the original or

That all of the networks, despite their differences

Were the same as the original.


Nevertheless, there were many who accepted

The invitation of the Builder and his administrators

And they discovered that the restored network

Had all the delightful features that had almost been forgotten

Long ago.

They loved the features and benefits of

The original network, now remembered,

And they shared their reviews with others.


To their dismay,

they discovered that many of their

Friends and co-workers

Said they were foolish or that they were deluded,

That they had been tricked

By the new administrators

Into thinking that the old network could exist today.

They called them names and excluded them

From their social circles.

But the new network grew and expanded

Little by little, until

Like a rock

Cut out of a mountain

Without hands,

It filled the entire earth.

 
 
 

Recent Posts

See All

Comentarios


© 2018, 2019, 2020 by ldsanon Proudly created with Wix.com

bottom of page