436
you are viewing a single comment's thread
view the rest of the comments
[-] reverendsteveii@lemm.ee 2 points 7 months ago

this, but doubly so with Eve. You'll notice that we often skip over Cindy and Dave and go right to Eve, so often that I don't even know off the top of my head whether Charlie and Deandra are the conventional names for persons 3 and 4 in this construct. That's because this construct is used a lot when talking about secure communications and the convention is that "evil" "eavesdropping" Eve is the person trying to destroy, intercept or alter the communication between Alice and Bob. Her role is built into her name.

this post was submitted on 17 Feb 2024
436 points (97.2% liked)

Programmer Humor

19208 readers
1347 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS