Mere Fidelity: Atonement

A few weeks ago Matt Anderson and I invited on Adam Johnson and Pascal-Emmanuel Gobry to talk about atonement. Our qualifications? Well, on our end, Anderson runs the Mere Orthodoxy site and I wrote this super-long post about penal substitutionary atonement. Adam Johnson has actually written a couple of books on the subject and teaches at Biola’s Torrey Honors program. So he’s kind of an expert. Now, Pascal, well, he’s my favorite French Catholic writer/twitter-fiend/troll on the internet right now. We debate stuff like this all the time, so we figured why not on the podcast?

So, here it is:

For more show links that I don’t feel like hassling with, go to MereOrthodoxy. They’re actually very helpful.

Soli Deo Gloria

3 thoughts on “Mere Fidelity: Atonement

  1. I enjoyed this conversation very much, as I do all the Mere Fidelity podcasts.

    One mild critique though. You all circled the issue pretty high up in the philosophical clouds, which is great, but didn’t really place your feet upon the solid ground of exegesis much. I would have loved to have heard that. (Although I’ve had friendly exegetical discussions with Catholic friends and know how that goes, haha).

    Anyways, perhaps a sequel? Or a series?

  2. Remotely monitoring premises using internet protocol (IP)
    camera equipment is a relatively new technology arrival even more
    so with wireless equipment capable of pan-tilt-zoom (PTZ) with wireless
    connectivity. This helps water cool more quickly and increases
    the rate of evaporation. Anyone who witnessed his backhanded acceptance of a Lifetime Achievement Award at the Golden Globes
    knows that Robert De Niro is a character.

  3. Best 14 Hack into Leading eleven soccer manager Tokens hack leading 12 crack electrical generator.

    Because she would bring down many of the most powerful people in the state.

    Blue chip companies have labored continuously to enhance the
    security of their networks, and yet hackers are still at work
    discovering new methods of breaching them.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s