The explanation is first rate and will allow anyone to perform a non-technical man in the middle attack, going from eavesdropping to exploitation.

Source: Tinder Social Engineering Attack – HERT