The explanation is first rate and will allow anyone to perform a non-technical man in the middle attack, going from eavesdropping to exploitation.
Source: Tinder Social Engineering Attack – HERT
        
        
    Robin Edgar
Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft
                            
                     robin@edgarbv.com                
                                
                     https://www.edgarbv.com