Dating sites by email
This could then prove useful when targeting the user in a “spear-phishing attack,” wherein the attacker sends the victim a credible-seeming email in an attempt to get him to click something he shouldn’t—thus opening the door to the company’s internal systems.
For example, information stolen in the Ashley Madison or Mate1 breaches could make it easier to build a profile of the user.
These are well-known key factors that make the process of attraction complete.
A solid background for making further serious steps, isn’t it?
If you need dating tips, here's tip number one: don't be afraid to try something new.
You're not skydiving here; you're just taking a small, simple step in the right direction.