ChubakPDP11+TakeWithGrainOfSalt@programming.dev to Programmer Humor@programming.dev · 9 months agoCan someone explain why authors do this?programming.devimagemessage-square58fedilinkarrow-up1449arrow-down112
arrow-up1437arrow-down1imageCan someone explain why authors do this?programming.devChubakPDP11+TakeWithGrainOfSalt@programming.dev to Programmer Humor@programming.dev · 9 months agomessage-square58fedilink
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up34·9 months agoBecause the names by themselves give you context about who’s transmitting to who, who’s trying to eavesdrop, and it’s become a convention. The convention isn’t necessary, but it makes material easier to understand because of the convention
minus-squaremox@lemmy.sdf.orglinkfedilinkarrow-up54·9 months agoAlice: Point A Bob: Point B Eve: Eavesdropper Mallory: Malicious Actor
minus-squareMagosInformaticus@sopuli.xyzlinkfedilinkEnglisharrow-up41·9 months agoNobody ever considers Eve’s side.
minus-squarejballs@sh.itjust.workslinkfedilinkEnglisharrow-up9·9 months agoDamn there really is an XKCD for everything
minus-squarefluxion@lemmy.worldlinkfedilinkEnglisharrow-up1·9 months agoThen you got guys like Alan Turing who couldn’t even talk about how they saved the world eavesdropping
Because the names by themselves give you context about who’s transmitting to who, who’s trying to eavesdrop, and it’s become a convention.
The convention isn’t necessary, but it makes material easier to understand because of the convention
Alice: Point A
Bob: Point B
Eve: Eavesdropper
Mallory: Malicious Actor
Nobody ever considers Eve’s side.
Damn there really is an XKCD for everything
Then you got guys like Alan Turing who couldn’t even talk about how they saved the world eavesdropping