Bob and Alice are two fictional characters commonly used as placeholders in discussions regarding cybersecurity, cyptography and so on. They are used to illustrate different scenarios and to make the content more relatable
That is why we have decided throughout this lesson to take the example of Bob and Alice, two partners that live together in a connected home and has many smart home devices.