This scenario is translated to a network environment [8]
where Alice and Bob use two networked computers for com-
munication (and Alice and Bob may be the same person).
Wendy represents the network management that exists be-
tween Alice and Bob (rewalls, intrusion detection systems,
etc.) that are able to monitor the trac between Alice and
Bob and alter, disrupt, or eliminate a detected subversive
communication channel.