You can edit almost every page by Creating an account. Otherwise, see the FAQ.

Retina (Hacker)

From EverybodyWiki Bios & Wiki

Notice

This page was uploaded to Wikipedia on July 25, 2022.

Editor IP addresses are publicly available for source control.

This page has been fact-checked and reviewed by a licensed legal attorney and the websites' content administration team.

This page is source-locked and cannot be edited by an outside party, request permission by citing your position as a higher authority.

inquiries@everybodywiki.com; legal@everybodywiki.com; content@everybodywiki.com; authority@everybodwiki.com

About

Retina is a former gray-hat computer hacker and an at-present self-proclaimed high-level programming language expert with a hobby for source code auditing and CPython contribution. Previously known as "X".

Retina (Hacker)
?.png ?.png
Signature profile picture drawn by the threat actor, seen used by Retina across social media and hacking forums; depicts the voluptuous ass of an anime girl with the Python programming language logo plastered in the upper left corner.
Native name"X"
Born
StatusTemporary hiatus
💼 Occupation
Source code auditor
💰 Net worth$843,488 (Disclosed cryptocurrency assets)
TitleKev: "intelligent",

Nano: "braniac",

Terror: "perfect",

Lore: "daddy",

Charge: "fella",

Scy: "son",

Pin: "skid"

Notability

  • AT&T - Security vulnerability hunter and zero-day exploit developer, infamous for the enumeration which led the contact details of ~740,000+ customers having been extracted and released to the general public. Disclosure of underground threat actor attack vectors, security vulnerabilities and their (at the time) exploitation methods, software source code (2020, 2021, 2022)
  • T-Mobile - Disclosed underground threat actor attack vectors, security vulnerabilities & their (at the time) exploitation methods, data breach; leaked internal and external software source code to the company in return for open-sourced software (2022)
  • Electrum (software wallet) - Disclosed source code vulnerabilities (security, performance), acted as a full-time bug bounty hunter and exploit developer (2022)
  • Twitter - Disclosed data breach (~15,000+ affected users) including confidential information; not to be confused with Twitter's 5.4M user data breach (2021)
  • Snapchat - Application programming interface reverse engineering, disclosure of user-related security vulnerabilities (2021)
  • Instagram - Application programming interface reverse engineering, disclosure of underground threat actor attack vectors (2021)
  • Telegram - Source code auditor, disclosure of cryptographic security issues and hybrid puppeting/relaybot bridge vectors (which are now able to abide by TOS for implementation) (2022)

#TYPELORD #0539 #MULTIPARADIGMFANATIC

Hashtags used by the threat actor on chatting platforms, such as Discord