Threads for simba

    1. 7

      C’mon man.

      Ajit Pai was born on January 10, 1973, in Buffalo, New York, and grew up in Parsons, Kansas. His parents are Konkani immigrants from India: Varadaraj Pai, a urologist, and Radha Pai, an anesthesiologist. Both of his parents moved to the US in 1971 and were physicians at the county hospital.

      You’re not even complaining about a member of the right set of brown people according to your own claims. India and Middle Eastern are different regions and peoples–and you’re assuming a great deal about the Middle East.

      (And that’s the problem with most racist views…they make people sloppy and lazy. Please don’t indulge either behavior here.)

    2. 7

      107 Republican members of congress voiced support, so no it’s not just Ajit. If you were less racist perhaps you’d be able to see that.

    3. 2

      This reads like copypasta…

    4. 2

      at least in this day and age the government is made up entirely of self-serving criminal cowards

      This is false.

    5. 1

      Well, there is the argument that its going to be a lot more difficult to root out corruption, if they’re all allowed to use their own encryption tools, hiding things from the public - their masters.

      But, the argument can also be made: we’re already in this mess. The ability of the government to keep such secrets is how we get ruled by corrupt masters, in the first place. Would that we, the people, had THEIR keys, and not the other way around ..

    6. 2

      Which nation would that be? (Not even gonna start on how offensive the slavery comparison is; nobody is making you use a computer, much less solve captchas)

      1. 1

        nobody is making you use a computer

        Well, short of having enough inheritance not to need to work, or an off-grid subsistence farm, I pretty much do have to use one. Most jobs are advertised only online, and many take applications only online. The last two public-sector jobs I’ve had have both required that I use the web-based application system, and the last one had a captcha for account creation, too!

        That’s one reason there’s an increasing push in many western countries for libraries to provide both computer access and training, because if you have no computer you’re increasingly shut out of most economic opportunities. I do think this should be coupled with more careful thinking about the role various private-sector actors have in controlling access to those opportunities (e.g. needing to solve a Google captcha to apply for a UK university job definitely raised an eyebrow for me).

    7. 12

      There’s absolutely nothing respectable about firing people. If you have to fire an employee then you failed miserably at your job. It’s almost never the employees fault when they get fired. It’s almost always the fault of HR for hiring the wrong people for the role, or management for not knowing how to lead, inspire and motivate their teams properly.

      I think that goes way too far in the opposite direction. There are genuinely toxic people out there. Sometimes those people can hide their toxicity well enough to pass through your interview process. At that point, once you’ve realized that this person is hurting your team, you should fire them. Claiming that there’s nothing respectable about firing people is equivalent to asking people to have perfect clairvoyance about the future behavior of someone they’ve met for at most a handful of hours.

      Of course, I do agree that after you fire a developer, you and your management should sit down and look at the process and ask yourselves, “Is there anything we could have done better here?” But sometimes the answer is, no, we couldn’t have done better here because to reduce the type-1 error of hiring a toxic person when we shouldn’t have, we’d have to raise type-2 errors significantly by rejecting anyone whom we didn’t think would fit perfectly with the team as it stands, even if they would have been a good contributor.

      Sometimes the cost of hiring diverse talent who’re adaptable and a have a wide range of skills is letting the occasional abrasive personality slip through. The key is to determine early on whether someone is affecting the team negatively, and then figuring out why and what to do about it an kind and humane manner.

      1. 1

        I agree that “abrasive” was poor phrasing. However, I wanted to find a more neutral phrasing that would convey the same meaning as “toxic” without the negative moral connotations. I agree that developers have personality quirks, and I would go farther. Sometimes the new-hire’s personality will clash with the collective personality of the team in a way that could not be forecast ahead of time, and, moreover, this is no one’s fault. In such cases, the kindest thing to do is to admit that things aren’t working out to let the new hire go (with a generous severance package).

  • 4

    I’m a bit surprised at all of the people rushing to defend Rick. Should the situation have never gotten that far? Sure. Does that absolve Rick from being very bad at his job? Not at all. Especially if you read some of the followups (e.g. Why Rick couldn’t come back from the brink), he was afforded ample opportunity to not be an asshole martyr.

    Are we so attached to the solo hero coder idea that we can’t help but defend it even when it’s as toxic as Rick is?

    1. 7

      I wouldn’t call the comments here as defending Rick as much as trying to be more critical of the author, who chose to exemplify his firing of an employee as an example of good management. I mean, it’s in the freaking inflammatory title: “We fired our top talent. Best decision we ever made.” Would you expect that to be the statement of a well-meaning, constantly-reflecting leader?

      1. 1

        The concept of “solo hero coder” is really attempting to diminish those people as unique individuals and mocking their talents and skills, which suggests jealousy or inferiority

        Would you prefer 10x/100x coder? Same concept. But I how you immediately jumped to assuming jealousy on my part. That’s a remarkable level of defensiveness.

        Levy’s book was written over three decades ago, about an industry that had only existed for about three decades before that. It has very little insight into the work of today, where, unless you’re producing disposable code, you need to be able to work with other people to make software.

        1. 2

          But I how you immediately jumped to assuming jealousy on my part. That’s a remarkable level of defensiveness.

          That’s not a fair reading–the concept of “solo hero coder” is very much an archetype being spread and deconstructed in programming and business culture today: you don’t need to infer accusation of jealousy. As @pushcx said, have charity towards other posters.

          I think @simba was pointing out that (rightly) there is very much an movement to discredit and suppress the “genius solo coder”. Whether that is good or bad is a different matter altogether.

          1. 5

            I’m guessing the last time you read it was also 3 decades ago.

            Please assume the best of fellow commenters.

          2. 1

            I’m guessing the last time you read it was also 3 decades ago.

            I’ve been in the industry a long time, but not that long. I read it in the mid-90s. My recollection is that the book largely consists of stories of individuals in the 1960s and 1970s creating or hacking impressive things, tied together thematically under the “hacker ethos”. When it was published, many pieces of commercial software (perhaps most, though I don’t know how large the non-microcomputer market was) were still written by one or a small number of programmers.

            That’s simply no longer the case. The vast majority of commercial software – heck, the vast majority of software that gets distributed at all – is written by a team.

            But that isn’t the case, many of the most important and useful softwares were written entirely by one person

            I’m curious to hear your (modern) examples.

            When a musician is extremely talented, nobody uses phrases like “solo hero musician” to describe them. They just pay them millions of dollars for their work

            That might not be an accurate portrait of the music industry. Talent does not equate to financial success, nor vice versa. That is even more true in the visual arts. It’s very hard to make a living as an artist, let alone make a fortune.

            Extremely talented developers deserve the same level of recognition and reward for their contributions.

            I mean, they do. Bill Gates, Linus Torvalds, John Carmack, Notch, are all examples of programmers who wrote successful software, and are now worth a great deal of money.

            1. 2

              I’m curious to hear your (modern) examples.

              minecraft, redis, Dwarf Fortress, Ethereum, Buckmaster over at Craiglist, Whitney’s K, for a start.

              1. 1

                Fabrice Bellard made ffmpeg and qemu (as a modern example).

  • 4

    Code that nobody else can understand is not the mark of a good developer. If people are describing your code as “very clever” then you’ve probably over complicated it.

    Real genius is being able to create simple solutions to complex problems.

    1. 9

      That might be case of different skill sets. Maybe that developer developed some “core functionality” which were really complex, and others were doing UI, auxiliary data processing, etc. Maybe other developers had less experience.

      For example, almost everyone who has basic understanding of computer graphics will say that Quake source code is clean, simple and easily readable but those who developed only web apps might say that it’s completely unreadable, and it even doesn’t have MVC architecture, classes, comprehensive tests and other “baseline best practices”.

    2. 4

      Seconded, although I disagree about it being hard. The majority of the difficulty is in knowing that you need SPF and DKIM. Setting them up isn’t rocket science.

      https://www.bettercloud.com/monitor/spf-dkim-dmarc-email-security/

    3. 4

      It’s not easy to operate an E-mail server

      This is often repeated as truth and rarely challenged, but in my experience running an e-mail server is not hard at all compared to many other system administration task. I’d put it about average. Any competent person should have no problem doing it.

      Implementing LDAP+Kerberos in an enterprise setting where it needs to interact with Windows clients is hard. Compared to that, running a mail server is a piece of cake.

      I don’t want anyone to think I’m spamming so I’ll refrain from naming my business here.

      I’m interested, If you don’t want to post here, care to send me a private message? Thanks.

      1. 1

        Postfix is not the only game in town though.

        1. 1

          I don’t think so. All the information is exposed, I don’t think anything is hidden, it’s just exposed in a way that at least some people consider easier to understand. You certainly need to understand how e-mail operates both with Qmail and Postfix, it’s just that with Qmail it’s easier to get a good, safe setup while postfix is confusing. At least to many people it is.

          I also heard good things about OpenSMTPD, but I haven’t had a change to actually work with it yet. To be fair, I also heard bad things from someone who migrated to OpenSMTPD from Qmail. We’ll see, I’m certainly interested in giving it a spin.

  • 3

    Depends on what you mean by “mass produced.” If you mean built in high volume at a single factory, then $300 doesn’t sound unreasonable. If you mean produced by every factory that makes keyboards like most commodity keyboards, then <$50 would sound more reasonable.

    You can read the blog posts over at http://blog.keyboard.io about producing a mechanical keyboard in China. There’s a huge amount of work in bringing a unique product like that to market. The reason a random keyboard from Fry’s is so cheap is that every company is practically selling the same keyboard with a different brand label on it.

    Regarding the comment “it’s not even wireless,” adding a BT IC and antenna to a keyboard hardly has any impact on the per unit cost compared to the mechanicals when you’re building something unique like this.

  • 3

    Keyboards should be moving in the direction of “tactile but silent”.

    Not really. Auditory feedback is processed much faster than tactile feedback and this matters when you start typing faster. Cherry MX brown switches are the best combination as far as I’m concerned.

  • 2

    or some HRTF binaural ASMR that emits the typing sound based on posture, limb lengths and key being pressed. But I have a sneaking suspicion that this guy wouldn’t consider it authentic enough. As much as I liked buckling spring, modern day mechanical are tactile enough that the sound pollution tradeoff just isn’t worth it.

  • 2

    You think there is enough demand to justify mass producing this?

    I think the only nonsense here is the $50 you just pulled out of thin air.

  • 5

    I guess it does. Even though we have seemingly reached the tipping point, the hard part now is to get the rest on HTTPS. It does help with browsers telling you about it.

  • 10

    Hacked by JUICE.

  • 1

    I think the page may look differently if you’re running content blockers.

  • 3

    There’s nothing wrong with arguing against CAN-SPAM (it has many problems!), but try to resist fabricating a narrative where it only has disadvantages.

    Sender pays (even if only cents) is the reason your physical letterbox isn’t buried in a pile of mail. Making law abiding corporations behave themselves and not overload your mail provider is an unambiguous win (they weren’t gonna do it on their own).

    There are legitimate uses for bulk marketing email. For example advertising to a targeted email list, services which those people might find useful. This would be a great tool for small businesses, but CAN-SPAM makes it illegal.

    Not illegal, if recipients opt in and have the option of unsubscribing. There are many online services who can run the technology for you if implementing unsubscribe yourself is too high a bar to clear.

  • 7

    suddenly saw their methods of ripping off millions of people threatened

    I’m with you in the sense that record companies are scummy and have done scummy things too, but “producing and selling music” does not qual “ripping off millions of people”.

    Now we see the same thing but it’s governments. They’re just as crooked as the record label executives tho.

    The key word here is actually “governments”. The MAFIAA couldn’t have “prevented progress” without the government’s intellectual property enforcement machinery.

    1. 0

      I don’t know. I think its more like “New Children, Rising”, in that all the technological prowess of the 5-eyes wouldn’t really be feasible without the emergence of an utterly totalitarian class of youth who have empowered these agencies to present the capabilities to their governments, and thus allow themselves to be weaponised.

      Its like what we’re dealing with here, with the 5 eyes context, is not so much “old men”, but rather “new generations”, akin to the very sorts we’re used to in the startup world, who have immense brilliance: yet decide to apply it to nefarious goals.

      Somewhere in the midst of all this political upheaval sits a hacker, or maybe a group of them, probably pretty young .. who are very, very pleased with their newfound totalitarian powers.

      This isn’t good for the world. But neither is your proposition: that we are all ruled by Old Men.

      (Truth: we’re ruled by hunger, old and new.)

  • 6

    No it isn’t, and it is simplistic to think this is the problem being discussed here. Libertarians need to grow up, get off their high horses, and shift their energies into problem solving rather than soap boxing.

    If someone breaks into your home and causes you grief then you have an expectation that, as a member of society, you can walk into a police station and call upon its resources. If someone jumps into a car the wrong side of four glasses of wine, whether or not injury or worse is resulting, then society addresses this.

    Yet, if the vector of grief delivery is purely computer/Internet in source, then different rules apply? Anyone looking for help is in fact an old man with old ideas and needs to die so society can get back to evolving?

    The problem space we are talking about here is that when a crime is in the process of or has been committed, society needs to be able to legally collect evidence.

    I’m going to be blunt now.

    You, like many others, are unable to separate the problem from the solutions being touted. The situation is not helped when only extreme and fringe examples are used to justify arguments resulting in only nonsense prevailing.

    Historically wiretaps have worked well and society is generally is accepting of them. They work as they are handled centrally and are physically secured. For old men, it makes sense to try to transfer these old ideas to new mediums and it is not a dumb idea to try. Of course only an expert though who knows that this is not going to be practical.

    Ironclad communications for all does not help society collect evidence. Should a trader who irresponsibly destroyed the Joe Public’s pension be immune from investigation as they used WhatsApp?

    We need something, but ironclad communications is not it. Maybe a blend of threshold with some kind of accountable wiretap journal is something more realistic.

    Arguing that the bad actors will anyway use ironclad communications is irrelevant in the same way that bad actors illegally obtaining firearms is already addressed. Arguing about government abuse and lack of oversight is another problem but it is not this one and confusing the two just helps no one.

    It is always good to apply the Passport to Pimilco test, a movie I recommend everyone watches, also being that it is a classic great fun movie to watch too.

    1. 12

      Historically wiretaps have worked well and society is generally is accepting of them.

      • The “historically” you’re talking about is only about a hundred years. In my country there are people living today who were born before the Supreme Court declared wiretapping to be constitutional in 1928.
      • I would argue that they have not worked well at all–that in fact they’ve been disastrous. They were instrumental in J. Edgar Hoover’s ability to turn the FBI into his own personal kompromat-collection service for decades. They were used to harass and intimidate many civil rights activists, including Martin Luther King Jr.–among many other targets chosen not because of their crimes but because they were political opponents of those in power. And they’ve been used similarly in many other countries.

      With cryptography we are able to take back a little of the privacy in our personal communications that people took for granted for most of human history.

    2. 5

      I am not a Libertarian. Or a crypto anarcho whooziwatsit. I’m not soapbixing. I’m just giving the inevitable deductions forced by the math behind crypto:

      You cannot give Theresa May what she wants without also giving Vladimir Putin the ability toi shut off our smart grids.

      You cannot give Theresa May what she wants wihtout also risking our entire financial infrastrucutre.

      So, if you want to kick smart grids off the Internet and require that they exist only in airgapped LAN segments (arguably a wise thing), and kick financial transactions off the Internet, then give her what she wants.

      1. 2

        Yeah. I’m not sure these regulations will actually destroy all trust in the internet. Monitoring and logging and what not are already built in to banking platforms dealing with trillions of dollars. People seem to trust the system despite all that. Enough to use it anyway.

      2. 2

        The analogy fails. Guns are physical things, and their ammunition is consumable. Encryption is knowledge, and once that knowledge is encoded as software, it is free to copy.

        Do US export restrictions on crypto ring a bell?

        You mean the completely ineffective restrictions on encryption? Yes, they do. They don’t work. They have never worked. They didn’t work back in the bad old days when they classified encryption as a “munition”, and they don’t work now.

        1. 2

          The analogy fails.

          The question was whether it is possible to ban something in one context while allowing it in another context. Guns, dangerous chemicals, and crypto all fit the bill.

          Whether you could make your own gun, your own explosive chemical, or your own crypto app is an orthgonal issue. I don’t think anyone here ever argued about whether “they” could take crypto away from tech-savvy individuals. However, such a ban and enforcement & punishment against tech companies plus targeted prosecution of private individuals’ unapproved use of crypto could quite effectively take it away from most people. All while simultaneously allowing its continued use in banks, mil, etc.

        2. 2

          You mean the completely ineffective restrictions on encryption? Yes, they do. They don’t work. They have never worked. They didn’t work back in the bad old days when they classified encryption as a “munition”, and they don’t work now.

          Perhaps my memory is faulty, but as I recall it was very difficult to find a software release with good crypto in those days (as a non-american).

          I would classify that as ‘working’ in that it achieved the goal of delaying widespread adoption of crypto, giving the US time to work on cryptanalysis, compromising root CAs, etc.

      3. 1

        If they actually couldn’t read WhatsApp’s messages after it adopted Signal’s encryption, they wouldn’t have let it happen.

        “Hi there. You will place backdoors X Y Z in the code, or we will fuck up your life, mmm’kay? You will not tell anyone about this, or we will fuck up your life.”

          1. 0

            Since you’re surely not asking for “their” exact identities, you don’t actually need an answer to that question.

            You’re just close to invoking “tinfoil” or something.

            You have to admit though, that what I suggested is a realistic, and even likely scenario. It essentially is that simple, so why wouldn’t they do it?

            1. 1

              Yeah, so I’m guessing NSA and the rest of the five eyed vampire squid. In that case, I don’t see what all the fuss is about. All Theresa May is trying to do is introduce a law to publicly acknowledge the already existing secret backdoors. Isn’t that a good thing? The government should be transparent about these things. If you want to tell a nontechnical user about the backdoors, surely it’s easier to point them at the law that mandates said backdoors than to explain how secretly broken crypto works?

              1. 1

                Yeah, so I’m guessing NSA and the rest of the five eyed vampire squid.

                I was actually thinking more along the lines of “The Powers That Shouldn’t Be”, or “The Establishment”. But I suppose the NSA is a part of that.

                All Theresa May is trying to do is introduce a law to publicly acknowledge the already existing secret backdoors. Isn’t that a good thing?

                So something like:

                1. We’re doing immoral things to the masses in secret. This is bad.
                2. We wrote a law that says we’ll do immoral things to the masses. Now there is no problem.

                Is that how you think? Is mass surveillance what the masses asked for, by voting in the politicians that would do it? (Please don’t answer “yes”)

                If you want to tell a nontechnical user about the backdoors, surely it’s easier to point them at the law that mandates said backdoors than to explain how secretly broken crypto works?

                What’s the meaningful distinction between:

                1. The government can read all your messages because they circumvented their encryption. They told you they’d do this!
                2. The government can read all your messages because they circumvented their encryption. They did this without telling you.

                Either way, the government reads your messages. The legality of the backdoors isn’t the issue here.

                1. 1

                  I have a strong preference that the government tell me what it’s up to.

                  1. 1

                    I have a strong preference that the government tell me what it’s up to.

                    That doesn’t address my point though. The problem is not that the government doesn’t tell you it’s doing bad things to you.

                    The problem is that the government is doing bad things to you.

                    1. 1

                      In a democracy, it’s reasonably important that you know what the government is doing, because you can’t vote on it otherwise.

                      That might not help much in (eg) the USA where the voting system ensures you only get to choose between two options, neither of which will take action on the issue.

                      1. 2

                        It should be patently obvious by now that they really don’t give a fuck about what you want.

                        They know that no one wants mass surveillance, but they’ll give it to you anyway, because it’s not done to your benefit. It’s not for “the greater good” either - it’s for the greater power and control over the tax-cattle.

                        No one wants wars, but they’ll make you pay for (or fight in) them anyway, and so on ad infinitum.

                        Trump was Hope & Change 2.0. You probably remember the first guy that promised to shut down Guantanamo. This one promised to “drain the swamp”, and proceeded to fill it with Goldman Sachs cronies instead.

                        The word “Democracy” should ring mighty hollow by now.

                    2. 1

                      Exactly. And what will defeating Theresa May’s law do to change that? The existing secret backdoors aren’t going to be removed. But if the law passes, then everybody, even the people who don’t believe the powers that be put a backdoor in whatsapp, will know the government is reading their messages.

                      1. 2

                        Once the law passes, it does not only set a terrible precedent, it will most likely never be repealed.

                      2. 1

                        everybody, even the people who don’t believe the powers that be put a backdoor in whatsapp, will know the government is reading their messages

                        That’s not a good thing though, because it advances the chilling effect, which is of course why they publicize the mass surveillance to begin with.

  • 7

    Libertarians need to grow up, get off their high horses, and shift their energies into problem solving rather than soap boxing.

    For the record, I’m not a Libertarian as it’s commonly understood. But what exactly are you suggesting they do? What would “problem solving” mean in practice? Are you not “soap boxing”?

    you have an expectation that, as a member of society, you can walk into a police station and call upon its resources

    Do you also have a reasonable expectation that the police will give a flying fuck and actually do something to achieve justice?

    Yet, if the vector of grief delivery is purely computer/Internet in source, then different rules apply?

    If you’re referring to “intellectual property theft”, we might agree somewhat. But if you’re arguing in favour of governments circumventing/breaking encryption so that they can catch terrorists, you’re way off the mark there.

    It’s not terrorists they’re after.

    You, like many others, are unable to separate the problem from the solutions being touted. The situation is not helped when only extreme and fringe examples are used to justify arguments resulting in only nonsense prevailing.

    I can’t tell what you mean with that.

    Historically wiretaps have worked well

    For maintaining a police state? -Why yes, they have.

    and society is generally is accepting of them

    You seem to be unable to separate “society” into rulers and subjects. People often talk about how “we” need to this and we need to that, but it’s not actually we that make the decisions. In case you haven’t noticed, whenever we demand something, we’re met with tear gas and batons.

    Ironclad communications for all does not help society collect evidence.

    There’s “society” again. Is it “society” that collects evidence? Is it “society” that wiretaps dissidents and “disappears” them?

    Should a trader who irresponsibly destroyed the Joe Public’s pension be immune from investigation as they used WhatsApp?

    Are there other ways the crime could be investigated, besides reading his encrypted private communications?

    1. 1

      Just for your last question, I think there’s a cost-related dystopian thought in the mix :(

      Catching criminals, for any value of crime, by reading their admissions online, is a very affordable way of cracking down.

      It also gives fertile ground for all sorts of new ways to set people up. Nothing read online can be a joke or considered spectral evidence. Gone are the days of stating “Cocaine and hookers last night” on a bank transfer.

    2. 0

      There’s “society” again. Is it “society” that collects evidence? Is it “society” that wiretaps dissidents and “disappears” them?

      Yes.

      Are there other ways the crime could be investigated, besides reading his encrypted private communications?

      So we are talking about invasion of privacy being the crux of the matter?

      All evidence collection by its nature is an invasion of privacy, whether it is looking at someones bank account, interviewing their friends or family or browsing their communications encrypted or not.

      Everyone should be entitled to their privacy, regardless of the medium but is it is irresponsible saying “over my dead body” knowing that it is no longer exotic for a crime to be purely digital and unaccountable?

      What tangible reason is a WhatsApp communication any different making a phone call and why it should it receive more legal protection than other mediums?

      I guess, victims should really be more accepting of an investigation going cold because the suspects used encryption? “If only they had use a PSTN line we could have done something” eh?

      1. 3
        There’s “society” again. Is it “society” that collects evidence? Is it “society” that wiretaps dissidents and “disappears” them?
        

        Yes.

        In most literature, that’s called a state. In a few cases, the states interests are sufficiently aligned with the societies interests to conflate the two; that’s far from common.

      2. 1

        Is it “society” that collects evidence? Is it “society” that wiretaps dissidents and “disappears” them?

        Yes.

        If you’re that dishonest, there’s really no point in discussing this further.

  • 4

    If someone breaks into your home and causes you grief then you have an expectation that, as a member of society, you can walk into a police station and call upon its resources. … Yet, if the vector of grief delivery is purely computer/Internet in source, then different rules apply?

    To use the model you’re advancing here, it would be as though the government wanted to address home break ins by installing centrally monitored cameras in all homes. Due to the nature of crypto, the exegeses are different, so different things are needed or must be considered. Your equivalence is false.

    1. 1

      We need something, but ironclad communications is not it. Maybe a blend of threshold with some kind of accountable wiretap journal is something more realistic.

      What on earth do you think I meant by this then?

      Christ on a bike, are you all insane?

      1. 1

        I am literally the Stasi.

        That’s not a popular position around here. Not what you actually said? Oh, well, better safe than sorry, I’m going to pretend you said something I disagree with. Don’t want to get caught agreeing with the wrong side.

  • 1

    Historically wiretaps have worked well and society is generally is accepting of them. They work as they are handled centrally and are physically secured.

    Yup. Historically they worked very very well. . However, events since then tend to have obscured one’s memory of the earlier events.

    I often wonder about the ways in which the two events might be related.

    I’m sure the average man in the street feels things are working well.