The attacker set up a fraudulent account on a dating platform and messaged John, proposing an introduction. Captivated by the deceptive profile pictures, John engaged in conversation with the imposter. After several hours of interaction, the attacker subtly inquired about his workplace, ultimately extracting critical details about the target company. Which social engineering tactic did the attacker employ in this case?