Editing 177: Alice and Bob
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 20: | Line 20: | ||
Finally, in a twist ending, the girlfriend is revealed to be none other than Eve, the ''eave''sdropper, who is also ubiquitous in Alice and Bob stories. Hell hath no fury, indeed. This also may be an allusion to B and E, or breaking and entering, as Eve may have done to get Bob's key. | Finally, in a twist ending, the girlfriend is revealed to be none other than Eve, the ''eave''sdropper, who is also ubiquitous in Alice and Bob stories. Hell hath no fury, indeed. This also may be an allusion to B and E, or breaking and entering, as Eve may have done to get Bob's key. | ||
β | The title text continues the theme of Randall getting | + | The title text continues the theme of Randall getting barred from speaking at conferences due to his unusual take on certain topics. |
To further spice things up, there are many other characters in the Alice/Bob canon, including Mallory, the ''mal''icious attacker, who wants to actually ''alter'' the message with nefarious intent; Craig, the ''cra''cker, who doesn't particularly care about the message but ''does'' care about the passwords used; Plod, a law-enforcement officer attempting to access keys or data; and Chuck, a third party in the communication who secretly has a villainous intent. | To further spice things up, there are many other characters in the Alice/Bob canon, including Mallory, the ''mal''icious attacker, who wants to actually ''alter'' the message with nefarious intent; Craig, the ''cra''cker, who doesn't particularly care about the message but ''does'' care about the passwords used; Plod, a law-enforcement officer attempting to access keys or data; and Chuck, a third party in the communication who secretly has a villainous intent. |