We use passwords to protect our computers, cellphones, and online accounts. We do this because, of course, we don’t want anything or anyone to access and corrupt our important personal information.
Want to read this article from the Journal?
Subscribe to JSH-Online to access The Christian Science Journal, along with the Christian Science Sentinel and The Herald of Christian Science. Find the current issues, the searchable archive, podcasts, audio for articles, biographies about Mary Baker Eddy, and more.