Brain Dump

Alice and Bob

Tags
security

Many [see page 35, discussions] of security begin with Alice, Bob and Eve.

Are three individuals who're often referenced in examples related to cryptography and system security. This is a convention.

Alice and Bob could be 2 devices/people/lovers who want to communicate securely. Eve is an intruder who tries to intercept, delete or modify messages between Alice and Bob.