My prayer is that anyone who enters this website will find the truth of the Bible. That the Bible is true. Jesus is the life, the light and the way. They accept Jesus into their heart and make him their Lord and Savior. 

Jesus is co​ming soon!

It is very concerning the way the world is today. I believe that the world cannot go on like this forever and the Bible tells us what signs to look for before Jesus comes back.


Things have gotten so bad especially since the pandmic of 2020. In 2020 governments shut down the whole world, We were not allowed to meet or be with family, attend church or any social gatherings. 

Since then the world has learned a lot more about the elites agenda,

1. The World Economic Forum, with leaders such as Klaus Schwab, Bill Gates, Melinda Gates and the worlds government leaders of every nation.

2. The movement toward a One World Government

3. The movement for Digital Id

4. The World Health Organization

5. World Population Control.

6. The Implementation of AI

This this some of the signs that the Bible tells us:

The one world government will set the way for the antichrist. He will come offering Israel and peace deal that will deceive the world. The world will think he is the savior and he will make a 7 year peace deal. There will be peace for 3.5 years in Israel and then the antichrist will stop sacrifice's which he allowed in the third temple which the Jews are ready to build right now. 

Daniel 9:20-27

The Seventy “Sevens”20While I was speaking and praying, confessing my sin and the sin of my people Israel and making my request to the Lord my God for his holy hill— 21while I was still in prayer, Gabriel, the man I had seen in the earlier vision, came to me in swift flight about the time of the evening sacrifice. 22He instructed me and said to me, “Daniel, I have now come to give you insight and understanding. 23As soon as you began to pray, a word went out, which I have come to tell you, for you are highly esteemed. Therefore, consider the word and understand the vision:24“Seventy ‘sevens’ are decreed for your people and your holy city to finish transgression, to put an end to sin, to atone for wickedness, to bring in everlasting righteousness, to seal up vision and prophecy and to anoint the Most Holy Place.25“Know and understand this: From the time the word goes out to restore and rebuild Jerusalem until the Anointed One, the ruler, comes, there will be seven ‘sevens,’ and sixty-two ‘sevens.’ It will be rebuilt with streets and a trench, but in times of trouble. 26After the sixty-two ‘sevens,’ the Anointed One will be put to death and will have nothing. The people of the ruler who will come will destroy the city and the sanctuary. The end will come like a flood: War will continue until the end, and desolations have been decreed. 27He will confirm a covenant with many for one ‘seven.’ In the middle of the ‘seven’ he will put an end to sacrifice and offering. And at the temple he will set up an abomination that causes desolation, until the end that is decreed is poured out on him.”



Digital ID And AI

This is from the World Economic Forum You will find a link to their website below.

 https://www3.weforum.org/docs/WEFINSIGHT_REPORT_Digital%20Identity.pdf

Executive summary There are roughly 850 million people who lack legal identification (ID), which makes it difficult or impossible for them to fully engage with society. At the same time, many of those with ID do not have privacy and control over how their data is shared. Several approaches to digital ID could help broaden access to goods and services and offer individuals greater privacy and control. This report explores one such approach: decentralized ID, which enables users to control their personal data while allowing issuers to contribute attestations, or credentials, about them. If implemented in a trusted, privacy-preserving manner, decentralized ID can increase access and control while enhancing efficiency and effectiveness. Yet decentralized ID also poses risks and faces challenges. To help realize the benefits and mitigate the risks of decentralized ID, this report provides analysis, tools and frameworks, summarizing the barriers to implementation facing decentralized ID and offering a set of recommendations for stakeholders seeking to adopt this approach. 1  ID overview For centuries, ID – a means by which people prove attributes about themselves – has played a pivotal role in society. Recognizing this, the United Nations Sustainable Development Goals identify legal identity as a development priority. As people’s lives become increasingly mediated by digital technologies, there is a related need to develop digital ID, or a way to make claims about personal data through digital channels. Centralized, federated and decentralized ID systems, as well as hybrid approaches, each with unique advantages and disadvantages, can help fulfil this need. 2  Decentralized ID Decentralized ID systems use cryptography, digital wallets and related technologies to enable multiple entities to contribute credentials and empower individuals to manage their data. Properly implemented, decentralized ID could enhance privacy, control, efficiency and effectiveness. A wide variety of technologies, standards and proposals – including verifiable credentials and decentralized identifiers, as well as principles and governance frameworks – exist to realize decentralized ID. However, this approach also poses risks. 3  Barriers to implementation Efforts are already under way to scale decentralized ID. Yet there are a host of barriers to implementation. A lack of widely agreed-upon technologies, standards and proposals limits the reach of these systems. The absence of enabling policy and regulation may curtail their efficacy. Decentralized ID also faces challenges of governance, communications and utility. 4  Recommendations For stakeholders who decide that decentralized ID is the right approach for their goals, this report offers technical, policy, governance and implementation recommendations. It advises industry that further technological innovation, standards alignment and talent development are necessary to achieve decentralized ID. Publicsector participants can contribute by exploring the development of enabling regulation, setting requirements for interoperability and portability, and fostering collaboration among key stakeholders. 3 Reimagining Digital IDIntroduction For people without official, or legal, identification, it can be difficult or impossible to fully participate in society. Roughly 850 million people worldwide lack an official ID, making it difficult for them to get a job, access medical care, enrol in a school, open a bank account or cast a vote.1 At the same time, many of those with ID lack privacy and control over how their data is shared. Today, innovative approaches to digital ID have been developed that could help expand access to goods and services while offering individuals privacy and control. This report focuses on one approach: decentralized ID, which seeks to enable users to control the sharing of their personal data while allowing multiple entities to contribute attestations, or credentials, about them. These credentials may be as simple as a date of birth or as complex as a citizenship. If implemented in a trusted, privacy-preserving manner, decentralized models of digital ID can offer individuals a secure way of managing their personal data without depending on intermediaries. While decentralized ID presents opportunities,  and has already begun to be adopted, it  also poses risks and faces challenges. Many  of its underlying technologies, governance frameworks, trust ecosystems and standards are still emerging and remain relatively untested at scale. As with many digital technologies, a misalignment between existing policies and regulatory frameworks and these models of ID could curtail their efficacy and create risks. Without public education, clear utility and incentives, decentralized approaches to ID may be unable to garner the broad stakeholder buy-in and user demand required for mass adoption. Though decentralized ID offers an opportunity to advance inclusion, effectiveness and privacy, without fit-for-purpose policy, regulation and technology, the potential for these systems to address the limitations of current global ID  paradigm while having a socially useful impact  will be severely limited. The aim of this report is to provide an analysis of decentralized ID from a technical and policy standpoint. The product of an international collaboration among experts drawn from industry, government, civil society and academia, the report seeks to offer useful tools, frameworks and recommendations for government officials, regulators and executives seeking to engage with this dynamic area of emerging technology. Recognizing that the objectives of governments, organizations, communities and individuals differ across jurisdictions, use cases, cultures and more, this report does not provide a one-size-fits-all set of recommendations. Nor does it advocate using decentralized ID over other forms of digital ID – or the use of any form of ID. There are instances in which any form of ID is deemed unnecessary, inappropriate or undesirable. Rather, this resource notes the advantages and disadvantages of decentralized ID compared to other approaches to ID and flags important considerations for stakeholders in the hope that this approach can aid their development of an effective ID strategy. Should a stakeholder choose to take this approach, the report provides tools to help realize its benefits and mitigate its risks. 4 Reimagining Digital IDID Overview 1 For centuries, ID, a way for people to prove attributes about themselves, has played a central role in society. Reimagining Digital ID 5This section provides an overview of important concepts pertaining to ID and digital ID. It offers a brief history of ID, an outline of different approaches to digital ID, and summarizes concepts including foundational and functional ID, the identity life cycle and levels of assurance. 1.1  A brief history of ID ID is a means by which people prove that they are who they say they are and various attributes about themselves. For centuries, ID has played a pivotal role in the development of economies and societies around the world,2 with ID in many cases being required to cross borders, gain labour opportunities, access credit and more. In 1948, with the proclamation of the International Declaration of Human Rights, nations enshrined the right to recognition before the law and the right to have a nationality.3 Both rights can be facilitated by the possession of proof of legal identity.4 The United Nations defines legal identity as “[...]the basic characteristics of an individual’s identity, e.g. name, sex, place and date of birth conferred through registration and the issuance of a certificate by an authorized civil registration authority following the occurrence of birth”.5 In 2015, with the adoption of the Sustainable Development Goals (SDGs), the international community recognized legal identity as a development priority. SDG 16.9 aims to “[...]by 2030, provide legal identity for all, including  birth registration”.6 Indeed, as the World Bank posits, ID can be a direct or indirect enabler of many sustainable development goals (SDGs), including access to finance, gender equality  and empowerment, and migration and labour market opportunities.7 While there has been significant progress, SDG 16.9 remains aspirational, with the World Bank estimating that roughly 850 million people lack an official ID. Providing proof of legal identity to those without it will depend on a concerted, multistakeholder effort led by governments as well as the development of robust systems to ensure that credentials provide real-world value to holders. As stakeholders determine how best to achieve SDG 16.9, some are considering developing decentralized ID systems in addition to efforts to provide proof of legal identity. Decentralized ID is a form of digital ID that enables individuals to control the sharing of their data, while allowing multiple entities to issue credentials to them. 1.2  Digital ID Digital ID provides a means of making claims about personal data through digital channels. Many things can have a digital ID, from hardware such as internet of things (IoT) devices to organizations, including corporate entities. This report focuses on ID for individuals. The increasing use of digital technology and the development of AI make the creation of digital ID important. According to estimates by the global financial crime watchdog, the Financial Action Task Force (FATF), the number of digital transactions is growing at roughly 12.7 % annually.8 Whether purchasing an item or accessing an in-person service, transactions are increasingly mediated by digital technologies, necessitating the development of effective forms of digital ID. Developments in artificial intelligence (AI) have also increased the need for digital ID. AI poses a threat to privacy because it can analyse seemingly unrelated data to reveal attributes about an individual.9 AI also has the potential to break mechanisms for authentication. These capacities necessitate the development of models of digital ID capable of preserving privacy while providing reliable authentication.10 AI systems are also now generating content, making it imperative to develop models of ID that can determine what was produced by an AI system. Despite a sustained focus on ID, the increasingly widespread use of digital technologies, and the rapid development of AI, the internet lacks an ID layer.11 To fill this gap, stakeholders offer centralized, federated and decentralized forms of ID to help facilitate transactions.12 Centralized providers establish and manage data on behalf of individuals. Federated solutions allow a single organization or closed network to verify facts on behalf of an individual. Decentralized ID systems, by contrast, allow an individual to control their data, which is verified by other stakeholders.13 Decentralized ID has elsewhere been referred to as self-sovereign ID, user-managed ID, secure ID and more. The aim of this resource is not to add confusion to these terms, but to encourage standardization  around a neutral term. The table below summarizes these system archetypes and some of their strengths and weaknesses. It should be noted that the  The World Bank estimates that roughly 850 million people lack an official ID. Reimagining Digital ID 6opportunities and challenges presented by each archetype are dependent on context and use case. Likewise, these archetypes are not necessarily mutually exclusive. Hybrid approaches making use of centralized and decentralized elements, for example, can offer a pathway for stakeholders to take advantage of some of the benefits of decentralized ID systems without fully adopting them. ID system archetypes – strengths and weaknesses TABLE 1 Source: World Economic Forum, Identity in a Digital World: A New Chapter in the Social Contract, September 2018:  https://www3.weforum.org/docs/WEFINSIGHT_REPORT_Digital%20Identity.pdf Each system archetype summarized in Table 1 can support forms of ID that are foundational or functional. The United States Agency for International Development (USAID) defines foundational ID as a national-scale official ID typically issued and managed by a government.15 For example, leveraging an enrolment process to develop a registry of citizens, governments can create foundational IDs. Issuers, including governments, non-governmental organizations and private-sector enterprises, can also issue functional IDs, which are defined by their capacity to enable individuals to access a discrete good or service or perform a specific action. Driver’s licenses, health insurance documentation, credit and payment histories and passports are all instances of functional IDs.16 While a useful distinction, the boundary between foundational and functional IDs can be blurry. Over time, certain functional IDs, such as the US driver’s license, may accrue such a high level of trust and utility that they become de facto foundational. Both foundational and functional IDs can be used in a decentralized ID system. For instance, systems can enable individuals to control their foundational ID credentials, facilitating access to services in a decentralized fashion.17 Likewise, decentralized ID systems can make use of government registries to provide individuals with official credentials while also allowing non-governmental stakeholders to issue other credentials to them.18 System archetypes Centralized Federated Decentralized Definition –A single organization establishes and manages the ID –Different stand-alone systems, each with its own trust anchor, establish trust with each other –Multiple entities contribute to a decentralized digital ID; user controls sharing of personal data Examples –Government electoral roll, bank, social media platform –Swedish BankID, Gov.UK Verify, Meta, Google –VCI, International Air Transport Association (IATA) travel pass, Government of Bhutan National Digital Identity (NDI) Strengths –Can be built for specific purposes or for general application –Potential for organizational vetting of data  –Potential to enhance features including account recovery  –Technology is broadly understood and implementable –Can enable users to access a wide range of services  –Potential to enhance efficiency for organizations  –Can be convenient for the individual, with potential for reuse  –Can offer reduced risk for organizations –Can increase user control, maintain privacy and reduce the amount of data stored by intermediaries  –Potential to enhance efficiency  –Can improve verifiability of data –Can enable data minimization at scale Challenges –May limit user control and create centralization risk, potential for surveillance and liability  –May not be interoperable with other approaches –Individual may not be able to reuse information across platforms –May create data “honey pots” and require high data security standards to prevent data breaches –Can create over-disclosure –May limit user control –May not be interoperable with other approaches –Individual may not be able to reuse information across platforms –May create data “honey pots” and require high data security standards to prevent data breaches –Can create over-disclosure –Can facilitate surveillance  –Governance can be complex –Acceptance of and alignment on underlying technologies and standards currently limited, potentially constraining interoperability –Evolving landscape of law and policy, creating complex liability –Can create data risks depending on ecosystem decisions  –High technical complexity and high demand on individuals –Full benefit may require the possession of high-assurance credentials14 Reimagining Digital ID 71.3  Fulfilling the identity life cycle  ID can be thought of as a process for fulfilling the identity life cycle, which according to the World Bank encompasses registration, issuance, use and management processes. In a government ID program, for example, during registration personal data is provided, validated for accuracy, deduplicated to ensure uniqueness, and verified to confirm that the data corresponds to the individual. FIGURE 1 Registration Identity data is collected and proofed Identity life cycle Issuance One or more credentials are issued Use An individual can then be issued credentials,  which may themselves be based on pre-existing documents, and use those credentials to access a good or service. When they do so, they are authenticated, verified and authorized. All of  these processes are ongoing events subject  to management – maintenance, redressal  and engagement.19 Management Identity is checked at the point of transaction Identity claim A person claims their identity by providing personal data and supporting documents or other evidence Proofing Validation: determining the validity, authenticity, accuracy and/or veracity of the identity data and evidence Deduplication: 1:N matching to ensure uniqueness (e.g. via biometric recognition or demographic deduplication) Verification: confirmation that the person is the true owner of the identity Identity registered and stored Credentialing Credentials and authentication factors are issued and bound to the person Authentication Tests of asserted credentials/ factors to establish confidence that the person is who they claim to be Verification Verifying attributes (e.g. name, age, address, etc.) specific to the purpose of the transaction Authorization Assigning the rights or privileges – to access a service, resource, information, etc. – as determined by the relying party (e.g. service provider) Source: The World Bank ID4D, Practitioner’s Guide: Identity Lifecycle: https://id4d.worldbank.org/guide/identity-lifecycle Depending on how it is performed, each step in the identity life cycle is executed to a different level of assurance. Assurance levels correspond with the degree of confidence attributed to a given form of ID, as well as to the number of IDs created. Maintenance of identities and credentials Maintenance Updating, revoking, reactivating, retiring, etc. identities and credentials Grievance and redressal Responding to and correcting errors and other issues Engagement Communication and consultation with people and other users (i.e. relying parties) In a risk-based authentication process, transactions are conditioned upon meeting or exceeding a certain level of assurance.20 In general, the Government-issued IDs can offer a high level of assurance depending on factors such as how well the government performed an identity-proofing procedure to establish uniqueness within  a population. assurance level for a given transaction is the lowest assurance that has been achieved during the registration, issuance and use processes. As there can be a tendency to require overly high levels of assurance, setting assurance levels in line with the risks posed by a given use case is one approach stakeholders can take to minimize data collection. Reimagining Digital ID 8Decentralized ID 2 Decentralized ID could enhance individual privacy and control, while increasing efficiency and effectiveness. 9 Reimagining Digital IDAs described in Section 1, there are several approaches to digital ID that could expand access and improve user outcomes relative to the status quo. This report explores one approach: decentralized ID. Section 2 provides an overview of this approach, situating it in the context of the wider ID landscape and articulating the opportunities it creates as well as the risks it poses, then offers a summary of some of the key principles, technologies, proposals and standards that support it. 2.1  Why is decentralized ID important? Decentralized ID uses cryptography, digital wallets and related technologies to enable multiple entities to contribute credentials and empower individuals to manage their data. Decentralized ID systems create a trust triangle that links issuers, holders and verifiers: issuers are entities that digitally sign attestations and provide them to holders; holders, such as individuals, manage their credentials and use them to prove claims about their data; and verifiers assess these attestations to determine whether they satisfy requirements.21 This process, which can be facilitated by a verifiable data registry, is discussed further in Section 2.4. Verifiable credential trust triangle FIGURE 2 Holder Manages credentials, uses them to create presentations of proof for verifiers Issuer Digitally signs attestations; packages and gives credentials to holder Verifier Requests proof; verifies that issuer attestations satisfy requirements Issue Present Verifiable data registery Write Read Source: Alexis Hancock, Digital Identification Must Be Designed for Privacy and Equity, Electronic Frontier Foundation, 31 August 2020: https://www.eff.org/ deeplinks/2020/08/ digital-identification-mustbe-designed-privacy-andequity-10 Decentralized ID could offer a means of improving individual control and access while enhancing efficiency and effectiveness. Decentralized ID systems attempt to empower holders to manage their credentials, increasing their control. If a diverse, trusted system of issuers and verifiers exists, holders can use their credentials to access a host of goods and services. Decentralized ID may also increase efficiency. Instead of entrusting a third party to store, manage and transmit data on their behalf, individuals can use decentralized ID systems to exchange credentials directly with one another or a service provider, reducing the number of intermediaries and increasing efficiency. Decentralized ID systems may also enhance effectiveness by reducing the number of times information has to be verified, which could increase convenience, reduce risk and diminish costs. Evolving use cases, such as education and skills credentials and public authority identity credentials, exemplify some of the benefits of decentralized ID (see Boxes 1 and 2). Reimagining Digital ID 10BOX 1 Education and skills credentials Decentralized ID offers a way for individuals to verifiably prove that they have attained a skills credential or received a degree or high-school diploma. Academic degrees and professional certificates can be issued on trusted, distributed, shared infrastructure that can enable individuals BOX 2 Public authority identity credentials to prove facts about their personal data without compromising their pseudonymity.22 These systems can enable distributed, inexpensive proofs that lower the risk of identity fraud and enable an individual to receive attestations from multiple entities.23 Public authority identity credentials offer a means for individuals to manage credentials from public-sector agencies without depending on a centralized intermediary. For example, by using a wallet and decentralized identifier (see Section 2.3) within the European Self-Sovereign Identity Framework (ESSIF), which is being implemented in collaboration with the European Commission, individuals can request credentials from public authorities that can then be used to attest to facts about their personal data in order to gain access to goods and services. Because ESSIF credentials are compliant with relevant public authorities, they can be used to facilitate access to services requiring high levels of assurance while still offering individuals control.24  Decentralized ID attempts to strike a balance between two paths: to protect individual privacy and control while facilitating compliant access to goods and services. The benefits of decentralized ID may be best understood by contrasting this approach with the contemporary ID paradigm.25 While there is no monolithic global ID regime, a collection of laws, policies and practices varying across jurisdictions, use cases and cultures underpin ID practices today. This report refers to this status quo broadly as the contemporary ID paradigm and draws examples of it from Web3, social media companies and financial services providers. In this section, it briefly summarizes the challenges created by this paradigm and considers how decentralized ID could address them. To identify the opportunities created by decentralized ID, it is illustrative to consider the state of privacy in the blockchain-enabled ecosystem known as Web3 where, on the one hand, open, public protocols such as Bitcoin and Ethereum provide transparency, enabling anyone with sufficient expertise to access detailed information. On the other hand, protocols such as the virtual currency mixer Tornado Cash offer anonymity by aggregating several transactions to obfuscate their origins and destinations.26 Decentralized ID attempts to strike a balance between these two paths: to protect individual privacy and control while facilitating compliant access to goods and services. Just as decentralized ID provides a c

 

Revelations 13:11-18

The Beast out of the Earth11Then I saw a second beast, coming out of the earth. It had two horns like a lamb, but it spoke like a dragon. 12It exercised all the authority of the first beast on its behalf, and made the earth and its inhabitants worship the first beast, whose fatal wound had been healed. 13And it performed great signs, even causing fire to come down from heaven to the earth in full view of the people. 14Because of the signs it was given power to perform on behalf of the first beast, it deceived the inhabitants of the earth. It ordered them to set up an image in honor of the beast who was wounded by the sword and yet lived. 15The second beast was given power to give breath to the image of the first beast, so that the image could speak and cause all who refused to worship the image to be killed. 16It also forced all people, great and small, rich and poor, free and slave, to receive a mark on their right hands or on their foreheads, 17so that they could not buy or sell unless they had the mark, which is the name of the beast or the number of its name.18This calls for wisdom. Let the person who has insight calculate the number of the beast, for it is the number of a man. That number is 666.


World Health Organization 

https://www.youtube.com/@wef

WHO Pandemic Treaty: what is it and how will it save lives in the future?

May 26, 2023This article is published in collaboration withReuters

The Pandemic treaty is expected to be finalized by May 2024, and would come into force once it has been ratified by two-thirds of WHO member states.


OUR IMPACTWhat's the World Economic Forum doing to accelerate action on Global Health?THE BIG PICTURE

Explore and monitor how Global Health is affecting economies, industries and global issues
CROWDSOURCE INNOVATION
Get involved with our crowdsourced digital platform to deliver impact at scale

Stay up to date:

Global Health

Follow

  • Negotiations on new rules for dealing with pandemics are underway at the World Health Organization (WHO).
  • The pandemic treaty seeks to shore up the world's defenses against new pathogens following the COVID-19 pandemic.
  • The pact would include provisions for sharing data, funding research and development, and responding to outbreaks.
  • It would also include provisions for strengthening surveillance and early warning systems and for building up stockpiles of medical supplies.

Negotiations on new rules for dealing with pandemics are underway at the World Health Organization (WHO), with a target date of May 2024 for a legally binding agreement to be adopted by the U.N. health agency's 194 member countries.

A new pact is a priority for WHO chief Tedros Adhanom Ghebreyesus who called it a "generational commitment that we will not go back to the old cycle of panic and neglect" at the U.N. agency's annual assembly. It seeks to shore up the world's defences against new pathogens following the COVID-19 pandemic that has killed nearly 7 million people.

What is the so-called Pandemic Treaty?

The WHO already has binding rules known as the International Health Regulations, which in 2005 set out countries' obligations where public health events have the potential to cross borders. These include advising the WHO immediately of a health emergency and measures on trade and travel.

Adopted after the 2002-2003 SARS outbreak, these regulations are still considered appropriate for regional epidemics, such as Ebola but inadequate for a global pandemic. These regulations are also being reviewed in the wake of COVID-19.

For the new more wide-reaching pandemic accord, member states have agreed that it should be legally binding for those who sign up, overcoming early reservations from the United States.

It would be only the second such health accord after the 2003 Framework Convention on Tobacco Control, a treaty which aims to reduce smoking via taxation and rules on labelling and advertising.

However, the proposed pandemic treaty has come under fire on social media, mostly from right-wing critics warning it could lead to countries ceding authority to the WHO. The body strongly refutes this, stressing that governments are leading the negotiations and are free to reject the accord.

DISCOVER

What is the World Economic Forum doing about fighting pandemics?

Show more

How do countries view the pact?

The European Union, which proposed the accord, is seen as its biggest backer. Developing countries, especially in Africa, are keen to use the negotiations to secure better access to vaccines, following allegations of "vaccine apartheid" from the WHO's Director-General Tedros.

After five rounds of formal negotiations, the latest 208-page draft of the treaty still includes thousands of brackets, which mark areas of disagreement or undecided language, including over the definition of the word "pandemic". With so many member countries involved, securing agreement may be tricky.

How would it work?

It is not yet clear how the 2005 regulations and the new pandemic accord might fit together.

One suggestion is that they should be complementary, so that existing rules apply to local outbreaks with the new rules kicking in if the WHO declares a pandemic - something it does not currently have a mandate to do.

It is also not yet clear what happens if the measures are not followed. A co-chair of the talks said it would be preferable to have a peer-review process, rather than sanction non-compliant states.

A World In At It's End

1. Lawlessness at all time high

2. Humanity who are lovers of self

3. Sexual Immorality At All Time High, Gay, Lesbian, Transgender, No Gender

4. People Are Lovers Of Money, Immoral, Arrogant, Full Of Hate, Godless, Etc.

2 TIMOTHY 3

1But mark this: There will be terrible times in the last days. 2People will be lovers of themselves, lovers of money, boastful, proud, abusive, disobedient to their parents, ungrateful, unholy, 3without love, unforgiving, slanderous, without self-control, brutal, not lovers of the good, 4treacherous, rash, conceited, lovers of pleasure rather than lovers of God— 5having a form of godliness but denying its power. Have nothing to do with such people.6They are the kind who worm their way into homes and gain control over gullible women, who are loaded down with sins and are swayed by all kinds of evil desires, 7always learning but never able to come to a knowledge of the truth. 8Just as Jannes and Jambres opposed Moses, so also these teachers oppose the truth. They are men of depraved minds, who, as far as the faith is concerned, are rejected. 9But they will not get very far because, as in the case of those men, their folly will be clear to everyone.A Final Charge to Timothy10You, however, know all about my teaching, my way of life, my purpose, faith, patience, love, endurance, 11persecutions, sufferings—what kinds of things happened to me in Antioch, Iconium and Lystra, the persecutions I endured. Yet the Lord rescued me from all of them. 12In fact, everyone who wants to live a godly life in Christ Jesus will be persecuted, 13while evildoers and impostors will go from bad to worse, deceiving and being deceived. 14But as for you, continue in what you have learned and have become convinced of, because you know those from whom you learned it, 15and how from infancy you have known the Holy Scriptures, which are able to make you wise for salvation through faith in Christ Jesus. 16All Scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, 17so that the servant of God may be thoroughly equipped for every good work.

 All Nations Of The World Are Preparing For War

Matthew 24:6-7 

.6You will hear of wars and rumors of wars, but see to it that you are not alarmed. Such things must happen, but the end is still to come.7Nation will rise against nation, and kingdom against kin.6You will hear of wars and rumors of wars, but see to it that you are not alarmed. Such things must happen, but the end is still to come.7Nation will rise against nation, and kingdom against gdom. There will be famines and earthquakes in various places.8All these are the beginning of birth pains.

I share these things as Jesus Christ instructed us to share his word and to watch for the signs and too lookup. 

Luke 21: 13-28

  13And so you will bear testimony to me.14But make up your mind not to worry beforehand how you will defend yourselves.15For I will give you words and wisdom that none of your adversaries will be able to resist or contradict.16You will be betrayed even by parents, brothers and sisters, relatives and friends, and they will put some of you to death.17Everyone will hate you because of me.18But not a hair of your head will perish.19Stand firm, and you will win life.20 “When you see Jerusalem being surrounded by armies, you will know that its desolation is near.21Then let those who are in Judea flee to the mountains, let those in the city get out, and let those in the country not enter the city.22For this is the time of punishment in fulfillment of all that has been written.23How dreadful it will be in those days for pregnant women and nursing mothers! There will be great distress in the land and wrath against this people.24They will fall by the sword and will be taken as prisoners to all the nations. Jerusalem will be trampled on by the Gentiles until the times of the Gentiles are fulfilled.25 “There will be signs in the sun, moon and stars. On the earth, nations will be in anguish and perplexity at the roaring and tossing of the sea.26People will faint from terror, apprehensive of what is coming on the world, for the heavenly bodies will be shaken.27At that time they will see the Son of Man coming in a cloud with power and great glory.28When these things begin to take place, stand up and lift up your heads, because your redemption is drawing near.”

.34Truly I tell you, this generation will certainly not pass away until all these things have happened.35Heaven and earth will pass away, but my words will never pass away.



Begin building a strong foundation with our powerful biblical resources

Make your company a better place.