If you didn't make the jump to the footnotes, I thought this was great:
"One of the Y Combinator questions asked you to name one non-computer system that you’d hacked in some interesting way. My answer concerned a man-in-the-middle attack I once did on Craigslist personals. I placed an ad as a woman seeking a man, and as a man seeking a woman, and then simply crossed the email streams by forwarding mail from one to the other, and vice versa. Most Craigslist personals didn’t even have photos back then, so the switch went undetected, even after the couples had met. I handed off the relationship by telling one that the other’s email address had changed, from my fake one to the real one, and likewise vice versa. For all I know, those couples are still together and having kids. They probably don’t know to this day what happened or what brought them together."
"One of the Y Combinator questions asked you to name one non-computer system that you’d hacked in some interesting way. My answer concerned a man-in-the-middle attack I once did on Craigslist personals. I placed an ad as a woman seeking a man, and as a man seeking a woman, and then simply crossed the email streams by forwarding mail from one to the other, and vice versa. Most Craigslist personals didn’t even have photos back then, so the switch went undetected, even after the couples had met. I handed off the relationship by telling one that the other’s email address had changed, from my fake one to the real one, and likewise vice versa. For all I know, those couples are still together and having kids. They probably don’t know to this day what happened or what brought them together."