Lowtech
- Status: Active
- Alias: Lowtech
- Other Aliases: None publicly known
- Real Name: Unknown (Burned his identity long ago)
- Age: Late 20s to early 30s
- Home: Auckland, New Zealand (Location constantly shifting)
- Birthplace: Unknown (Claims he "grew up on the net")
- Gender: Male
- Height: 5’8” (173 cm)
- Weight: 140 lbs (64 kg)
- Build: Slim, wiry, not built for physical confrontations
- Hair: Messy dark brown, often unkempt
- Hair Style: Perpetually disheveled, like he hasn’t slept properly in weeks
- Eyes: Dark hazel, bloodshot from too many screens
- Ancestry: Mixed heritage, but intentionally vague about his background
- Skin: Light olive, but often looks paler due to spending most of his time indoors
- Occupation: Underground Hacker, Information Broker, Cyber Black-Market Dealer
Background
Lowtech isn’t just a hacker—he’s a digital ghost, a man who exists entirely off the grid except where he chooses to be seen.
Once, he might have had a normal life, but at some point, he burned every connection to his past, rewriting himself as a man who trades in secrets, digital blackmail, and stolen corporate data.
He’s not a hero, not a villain—just a guy who thrives in the digital underworld.
- Started as a black-hat hacker in his teens, breaching government databases, corporate systems, and private security firms.
- Gained notoriety after exposing a corporate meta-research scandal, forcing him to erase his real identity to avoid retribution.
- Now operates as a broker—he doesn’t just steal information, he sells access to the right people.
- His clients include criminals, rogue metas, anti-corporate rebels, and sometimes even heroes who need information they can’t obtain legally.
- His Rules:
- Information isn’t free—everything comes with a price.
- He doesn’t work for one side—loyalty is bad for business.
- He doesn’t get involved—he provides the data, what happens next isn’t his problem.
Powers/Skills/Abilities/Weaknesses
Primary Skill – Cybernetic Mastermind
- Elite hacker—able to breach high-security systems, crack encryption, and manipulate digital footprints to erase records.
- Underworld Networking—has access to private servers, black-market data leaks, and deep web transaction records that no one else can reach.
- Data Ghosting—can scrub and rebuild identities, making people disappear digitally (or ensuring someone can never hide again).
Secondary Skills – The Hacker’s Toolkit
- Custom-built rigs—he never uses standard tech; everything is heavily modified and impossible to track.
- Social Engineering Expert—doesn’t just rely on computers, knows how to manipulate people into revealing what he needs.
- Remote Surveillance Gear—can tap into security feeds, track movements, and intercept private communications.
Weaknesses:
- Physically useless in a fight—he’s not trained, not fast, and avoids violence at all costs.
- Not a combat meta—if caught in a dangerous situation, his only defense is running or talking his way out.
- Paranoid & Overcautious—burns locations frequently, avoids meeting people face-to-face unless necessary.
- His curiosity gets him in trouble—he can’t resist a puzzle, even if it leads him into dangerous situations.
Personality
- Cynical, but not cruel. He doesn’t care who wins or loses, as long as he profits.
- Sarcastic, dry-witted, and impossible to intimidate.
- Loves proving people wrong—especially when they underestimate him.
- Plays everything like a game—but he knows the consequences are real.
- Rarely trusts anyone—but respects people who play smart.
- Not completely heartless—but will never admit if he helps someone out of anything other than business.
Public Perception
- Among Criminals & Metas: A go-to fixer for stolen data, identity scrubbing, and cyber-intel.
- Among Law Enforcement: A constant problem that no one can pin down.
- Among Heroes: Some despise him for working with criminals, others use him as a necessary evil.
- Among Corporate Entities: Many have standing kill-on-sight orders for him.

Children
Comments