██ ████ ████ ██ ██ ██████ ██████ ██ ████ ████████ ████████ ████ ██████ ████████ ████████ ██████ ██████ ████████ ████████ ██████ ████████ ██████████ ██████████ ████████ ██ ████████ ██████████ ██████████ ████████ ██ ████ ██████ ██████████ ██████████ ██████ ████ ██████ ████ ██████████ ██████████ ████ ██████ ██████ ██ ██████████ ██████████ ██ ██████ ██████████ ██ ████████ ████████ ██ ██████████ ████████ ████████ ████████ ████████ ██ ████████ ██████ ██████ ████████ ██ ████ ██████ ████████ ████████ ██████ ████ ██████ ██ ████████ ████████ ██ ██████ ██████████ ████████ ████████ ██████████ ██████████ ████████ ████████ ██████████ ██████████ ████████ ████████ ██████████ ██████ ████████ ████████ ██████ ████████ ████████ ██████ ██████████ ██████████ ██████ ████ ██ ████ ████ ██ ████ ██ ██ ██ ██ █████████████████████████████████████████████████████████████████████████████ Dox created by: vexxy#0001 Dox created for: Christian Reid Fav quote: "If you want to be a winner you'd be the first one to do it" Table Of Contents: 0x1 - Personal info 0x2 - Contact info 0x4 - Employment info 0x5 - Data breaches 0x6 - possible relatives & associates 0x7 - past info █████████████████████████████████████████████████████████████████████████████ Name: Christian Jacob Reid Age: 27 DOB: 11/??/1994 Employment: Freshman football coach at Hillcrest High school His High school: La Sierra High School Education level: N/A Football stats: https://www.maxpreps.com/athlete/christian-reid/C-ZMMvTwEeKZ5AAmVebBJg/default.htm Country: United States State: California City: Riverside Zip: 92504 Address: 3256 Kirklee Ln Pic of house: N/A [no street view data] [Format: 3256 Kirklee Ln, Riverside, CA 92504] █████████████████████████████████████████████████████████████████████████████ Phone num 1: (951) 201-9761 - Wireless Phone num 2: (951) 353-0933 - Landline Email: breadman219@gmail.com Other name 1: Christian Strother Other name 2: Chris Roper █████████████████████████████████████████████████████████████████████████████ Employment place name: Hillcrest High school Employment website: https://www.alvordschools.org/hillcrest Phone number: (951) 358-1755 Fax number: (951) 358-1768 Address: 11800 Indiana Avenue, Riverside, CA 92503 █████████████████████████████████████████████████████████████████████████████ FROM https://haveibeenpwned.com/ Email entered: breadman219@gmail.com Oh no — pwned! Pwned in 5 data breaches and found no pastes (subscribe to search sensitive breaches) Breaches you were pwned in: Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data. Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles ======================================================================================= ======================================================================================= HauteLook: In mid-2018, the fashion shopping site HauteLook was among a raft of sites that were breached and their data then sold in early-2019. The data included over 28 million unique email addresses alongside names, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com. Compromised data: Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords ======================================================================================= ======================================================================================= River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. Compromised data: Email addresses, IP addresses, Names, Physical addresses ======================================================================================= ======================================================================================= Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur". Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses ======================================================================================= ======================================================================================= Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses FROM https://intelx.io/?s=breadman219%40gmail.com%20 Found 3 CSV Files, 2 Text Files Allfeeds Full file 56931519.rar/Allfeeds Full file 56931519 2.csv 2021-09-09 10:13:48 Data4marketers Special K Data Feed Spam List.rar/FeedsLast4Days.csv 2020-11-11 06:56:20 redXXX_Feed- 2019.zip/Feed - 2019/EmailMonetize_20190429080033.csv 2019-04-29 13:48:05 HauteLook.7z/Data/hautelook.txt 2020-08-02 22:54:53 Collection #2-#5 & Antipublic/Collection #3_OLD LEAK.tar.gz/Collection #3_OLD LEAK/gmail.txt.part.txt 2019-01-18 01:31:48 █████████████████████████████████████████████████████████████████████████████ Possible Relatives Ashlei Nicole Parker, Chad K Reid, David Eugene Strother, Gavin Reid, Jacob Michael Strother, Jennifer M Reid, Jordan D Strother, Kristty V Reid, Kristy Vania Reid, Lauren N Reid, Reid Taylor, Steven D Reid, Tommie N Labrie, Edward A Reid, Gerald Trent Reid, Patricia J Reid Jr, Stewart J Reid Jr, Suzanne T Reid, Amber L Strother, Doris C Strother, Emily May Strother, Mary D Strother Possible Associates Maryann E Parker, Alatina J Sautia, Chauncey C Labrie, Connie T Collins, Daisia R Labrie, Joel Campbell Claborn, Jonathan D Parker, Joni L McDonald, June Anne Day, Kali C Labrie, Kali N Labrie, Matthew O Collins, Reid Rd Stewart, Russell Douglas Collins, Shaun D Labrie, Tracy Reid Marks, Twilene B Reed █████████████████████████████████████████████████████████████████████████████ 2969 Fillmore St, Riverside, CA 92503 (Nov 2012 - Apr 2022) 11225 Metcalf Ln, Riverside, CA 92505 (Dec 2017) 3625 Banbury Dr #18N, Riverside, CA 92505 (Mar 2017 - Jun 2017) 3234 Rainforest Dr, Riverside, CA 92503 (May 2012 - Jun 2017) 10406 Indiana Ave #237, Riverside, CA 92503 (Nov 2012)