ChubakPDP11+TakeWithGrainOfSalt@programming.dev to Programmer Humor@programming.dev · 1 year agoCan someone explain why authors do this?programming.devimagemessage-square53fedilinkarrow-up1447arrow-down113
arrow-up1434arrow-down1imageCan someone explain why authors do this?programming.devChubakPDP11+TakeWithGrainOfSalt@programming.dev to Programmer Humor@programming.dev · 1 year agomessage-square53fedilink
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up34·1 year agoBecause the names by themselves give you context about who’s transmitting to who, who’s trying to eavesdrop, and it’s become a convention. The convention isn’t necessary, but it makes material easier to understand because of the convention
minus-squaremox@lemmy.sdf.orglinkfedilinkarrow-up55·1 year agoAlice: Point A Bob: Point B Eve: Eavesdropper Mallory: Malicious Actor
minus-squareMagosInformaticus@sopuli.xyzlinkfedilinkEnglisharrow-up41·1 year agoNobody ever considers Eve’s side.
minus-squarejballs@sh.itjust.workslinkfedilinkEnglisharrow-up9·1 year agoDamn there really is an XKCD for everything
minus-squarefluxion@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoThen you got guys like Alan Turing who couldn’t even talk about how they saved the world eavesdropping
Because the names by themselves give you context about who’s transmitting to who, who’s trying to eavesdrop, and it’s become a convention.
The convention isn’t necessary, but it makes material easier to understand because of the convention
Alice: Point A
Bob: Point B
Eve: Eavesdropper
Mallory: Malicious Actor
Nobody ever considers Eve’s side.
Damn there really is an XKCD for everything
Then you got guys like Alan Turing who couldn’t even talk about how they saved the world eavesdropping