Videos about cyber security + software security | New videos every week
Across 11 videos, this channel demonstrates low persuasion intensity, primarily through Performed authenticity. Recurring themes suggest consistent operative goals beyond stated content.
Performed authenticity
The deliberate construction of "realness" — confessional tone, casual filming, strategic vulnerability — designed to lower your guard. When someone appears unpolished and honest, you evaluate their claims less critically. The spontaneity is rehearsed.
Goffman's dramaturgy (1959); Audrezet et al. (2020) on performed authenticity
Moderate persuasion used transparently. The channel is upfront about its perspective — this is rhetoric, not manipulation.
Low Level operates as a high-funnel educational platform that converts technical curiosity about modern exploits into enrollments for its proprietary academy and leads for enterprise security sponsors. By consistently demonstrating deep technical expertise, the channel fosters a belief that the cybersecurity landscape is increasingly volatile and that formal, low-level technical training is the only viable defense for a professional career.
The channel uses deep-dive analysis of specific exploits (Dell, Chrome, Windows, Telnet) to establish authority and funnel viewers into the 'Low Level Academy' paid courses.
Specific security threats are framed as problems that require the professional tools of sponsors like Flare, Endor Labs, and Intruder to solve effectively.
The channel highlights the risks of AI-generated 'slop' and automated threats to position human-led technical expertise as the only way to remain relevant in the job market.
Offers a clear, step-by-step technical explanation of a chained SD-WAN exploit including peering vuln, firmware downgrade, and CLI path traversal, with log indicators for detection.
the most advanced hack i've ever seen
The video provides a clear, accessible breakdown of how URI handling in markdown parsers can lead to remote code execution in seemingly simple apps.
no f***ing way
The video provides a clear, accessible breakdown of symmetric vs. asymmetric cryptography and how hard-coded keys undermine system security.
dude wtf
The video provides a clear, accessible explanation of 'use after free' memory errors and how they manifest in complex software like browsers.
they hacked CSS
Provides a clear, accessible breakdown of complex cybersecurity concepts like DLL sideloading, TLS interception, and manifest hijacking.
notepad++ situation is crazy
Provides a clear, high-quality technical breakdown of a command injection vulnerability and demonstrates how legacy code can persist in modern infrastructure.
omg please stop using telnet
Performed authenticity
The deliberate construction of "realness" — confessional tone, casual filming, strategic vulnerability — designed to lower your guard. When someone appears unpolished and honest, you evaluate their claims less critically. The spontaneity is rehearsed.
Goffman's dramaturgy (1959); Audrezet et al. (2020) on performed authenticity
Fear appeal
Presenting a vivid threat and then offering a specific action as the way to avoid it. Always structured as: "Something terrible will happen unless you do X." Most effective when the threat feels personal and the action feels achievable.
Witte's Extended Parallel Process Model (1992)
Direct appeal
Explicitly telling you what to do — subscribe, donate, vote, share. Unlike subtler techniques, it works through clarity and urgency. Most effective when preceded by emotional buildup that makes the action feel like a natural next step.
Compliance literature (Cialdini & Goldstein, 2004); foot-in-the-door (Freedman & Fraser, 1966)
Remedy-positioning
This technique was detected by AI but doesn't yet map to our curated glossary. We're tracking its usage patterns.
Calls to action follow emotional buildup. Consider whether the ask would feel as urgent without the preceding framing.
This content frequently uses emotional appeal. Notice when feelings are being prioritized over evidence.