In Tudor court, a king of might and dread,
Henry the Eighth, his power vast and grand,
His subjects trembled when he lost his head,
Each wife he wed, they met a gruesome end.
The whispers in the palace corridors,
Of plots and schemes that haunt each noble's mind,
Fear grips the heart, as danger still endures,
In the pursuit of power, none are kind.
The executions carried out with speed,
No mercy shown to those who dare defy,
The fear of wrath, a burden to concede,
In Henry's court, where truth and lies collide.
So let us heed the lessons of the past,
And pray that fear and tyranny won't last.
Gifs: C-SPAN
Have you seen the New Yorker article recently posted entitled, "Broken, Defaced, Unseen: The Hidden Black Females of Western Art" by Robin Coste Lewis?
[“The Voyage of the Sable Venus from Angola to the West Indies,” a wood engraving by W. Grainger after T. Stothard.]
I had not seen or read this yet, and I’m so grateful you’ve brought it to my attention.
The entire article is an incredibly moving meditation on the life-transforming powers of art and research.
To my daughters and sisters: Don’t fall for his words, fall for his actions.
Shaykh Waleed Basyouni (via thatkindofwoman)
I’m bout to give em that traction, send a distraction, then ima line em like fractions!!!!!😩
Eye opener
ICYMI: PBS programs received 26(!) Primetime Emmy Award nominations.
Reblog to join us in congratulating all of our talented producers and all the other nominees!
U.S. law enforcement officials say ISIS terrorists may have planned the Paris attacks with user-friendly encrypted messaging apps that have now become nearly impossible for police to crack.
Former CIA deputy director Michael Morell said this weekend that ISIS and other terrorists are able to communicate under the radar of Western intelligence agencies as a result. “I think this is going to open an entirely new debate about security versus privacy,” Morell told CBS’ Face the Nation.
Jihadist groups have abandoned email and cellphones for secure systems created by big Western social media companies. Google, Facebook and Twitter have started using an encryption technique called “perfect forward secrecy” that creates a unique key for each encryption. It does not create a long-term master key, or “back door” that can be used to unlock them.