436
Can someone explain why authors do this?
(programming.dev)
Welcome to Programmer Humor!
This is a place where you can post jokes, memes, humor, etc. related to programming!
For sharing awful code theres also Programming Horror.
this, but doubly so with Eve. You'll notice that we often skip over Cindy and Dave and go right to Eve, so often that I don't even know off the top of my head whether Charlie and Deandra are the conventional names for persons 3 and 4 in this construct. That's because this construct is used a lot when talking about secure communications and the convention is that "evil" "eavesdropping" Eve is the person trying to destroy, intercept or alter the communication between Alice and Bob. Her role is built into her name.