ENCRYPTED PURPOSE - Pt 2 DECRYPTION
Let’s begin our time today with a brief recap of our previous discussion on Encryption.
Encryption is the process of scrambling a person’s private and personal information so that it is inaccessible to anyone else who might try to access or use that information.
Encryption provides privacy, security, integrity, authentication and protection for the owner of the information. This process prevents anyone else from changing it, altering it, stealing it, stopping it, delaying it, duplicating it, or even knowing someone else’s personal information.
Last time we engaged in the notion that these features of Encryption don’t only apply to our Personal Data, but they also apply to our Personal Purpose too…our Encrypted Purpose!
One could say that Encryption safeguards the purpose of our Purpose
No one else can access the encrypted files related to your purpose except for you and the purpose giver.
Others can’t even locate it, because the “CRYPT” inside your ENCRYTPTION has been hidden and buried deep within you.
Just like some of the other CRYPTS we discussed before, your PERSONAL PURPOSE CRYPT (PPC) holds treasures, artifacts, clues, secrets, to help you overcome, understand, adapt and thrive in different situations and circumstances that you will face in life.
Unlock your Encryption and you will find the details of your WHY!
But, in order for us to receive this treasured trove of information we must first De-Crypt it.
For those who might be wondering if decoding and decrypting are the same thing. They are not. Decoding is reversible, which means someone can hack your system and change your password and alter your destiny forever. I’m sure you wouldn’t want that.
Decryption on the other hand has a security measure installed that only allows the owner and holder of that specific key to unlock its hidden treasures. You are the only one who has the key to your purpose.
With that said let us look deeper into the Crypt of Decryption.
When dealing with data in the context of Cybersecurity, the process of decryption uses algorithms to reverse or unlock the encryption. Algorithms are a fancy way of saying it presents various challenges and problems to the encryption to see what unlocks its code.
This process is the same for our Spiritual-security. The challenges and issues that we face provide a clue as to what our purpose is. Each Spiritual algorithm we face helps us to unlock our specific Purpose Encryption code.
As we each have our own set of unique fingerprints, so too do we each have our own set of unique challenges and purpose code.
Every issue we face is turning various sequences of combinations on the lock of our encryption trying to open our crypt/vault of purpose.
In the data world you need cybersecurity that relates to the culture of computers, but in the world of humans you need a spiritual security system that relates to the souls of people, it’s called discernment.
Keep in mind that previously we discussed there are some programs/beings that are encrypted/assigned just to keep you from learning and walking in your purpose. We must be able to distinguish which is which. That’s why we need discernment.
After decryption/accessing the information, we need to decipher it, that’s where discernment comes in. Decipher provides knowledge, now we know what’s inside/ the contents. Discernment helps us understand what to do with what we know.
Remember the wise Proverb, “In all your getting, get understanding”
Here are some other passages in the Bible that support the concept of Decrypting your Encrypted Purpose:
The glory of God conceals things, but the glory of kings is to investigate them. Proverbs 25:2
Understanding and knowledge from God is a mystery, which is Christ, in who are hidden all the treasures of wisdom and knowledge. Colos. 2:2
The secret things belong to the Lord our God, but the revelation of them belongs to his children and their children, forever. Deuteronomy 29:29
Decrypting your Purpose requires revealing some hidden meanings and understanding of those underlying concepts behind certain situations that you frequently find yourself involved in.
Each algorithm or challenge we face is a piece of the puzzle, known as our purpose. No two puzzles or purposes are alike.
To "Decrypt your Purpose," you must find the 'key' by assembling the pieces of the puzzle of your algorithmic challenges.
Puzzles are pictures, and pictures provide powerful information- much like a code does.
Look back over some of the major events of your life—open your spirit so that you can see what those pictures are saying to you.
Think of any good that came from that situation. You might have to dig deep inside. Remember to solicit the Spirit of Discernment to help you.
Each challenge algorithm provides a clue to Your Why…Your Purpose.
Our goal is to move from Confusion to Clarity. Self-reflection helps with that.
Next time we’ll take a few more practical steps deeper into decryption.
Some believe crypts are for burial, but our crypts are for birthing.
Isn’t it time the world knows who you are? You were born for such a time as this!
This is a Thompson Truth