We use passwords to protect our computers, cellphones, and online accounts. We do this because, of course, we don’t want anything or anyone to access and corrupt our important personal information.
Want to read this article from the Journal?
Subscribe to JSH-Online to access The Christian Science Journal, along with the Christian Science Sentinel and The Herald of Christian Science. Get unlimited access to current issues, the searchable archive, podcasts, audio for issues, biographies about Mary Baker Eddy, and more. Already a subscriber? Log in