There is Alice and there is Bob. But what is the name of the malicious user?
I know it is a kinda funny and maybe even naive question but its still security related, so I decided to ask.
Bob and Alice are widely used names indicating the two end-users/parties for web protocols. But in security there is also a third… Continue reading There is Alice and there is Bob. But what is the name of the malicious user?