An individual named Aryan is driven by the goal of enhancing internet security. He utilizes his expertise to conduct network scans on different organizations, identifying vulnerabilities without seeking explicit permission from the owners. Aryan takes a responsible approach by informing the company owner about the identified issues. However, if the company disregards his notifications and fails to address the vulnerabilities, Aryan resorts to making them public, compelling the company to take corrective action. What type of hacker is most fitting for Aryan in this scenario?