All creators
David Bombal

David Bombal

Security, automation, and OS configuration with a focus on practical exploits and expert interviews.

Rating
7.6
ReReview score
Award
Worth Prioritizing
Chart
#45
AI & Software Tools
Subscribers
3.0M
YouTube
Age
18y 0m
Channel age

Nutrition Label

David Bombal provides high-utility technical content blending hands-on tutorials with expert interviews in the cybersecurity and software space. He excels at demonstrating real-world workflows, often showing live exploits, BIOS-level configurations, and troubleshooting steps rather than polished simulations. While the technical advice is sound and transparent, viewers must navigate past aggressive SEO titles that frequently date content years into the future.

Strengths

  • +Demonstrates live technical workflows
  • +High-signal expert interviews
  • +Clear sponsorship disclosures

Notes

  • !Ignore future dates in titles; check the upload date to confirm the software version is current.
  • !Tutorials show real friction and failure points, offering more realistic expectations than polished demos.

Rating Breakdown

Experience Authenticity
7.7
Rigor & Evidence
7.0
Original Analysis
6.1
Technical Depth
7.4
Disclosure Clarity
8.1
Title-Content Alignment
7.0
Expertise Signal
8.3
Communication Effectiveness
8.1

Breakdown across the key dimensions we rate. Methodology →

Why this rating

Evidence receipts showing why each dimension is rated the way it is.

Transparency9/10
Big thanks to Brilliant for sponsoring this video... Please note that links listed may be affiliate links
[Description]

Full disclosure of sponsorship and affiliate status in the description, alongside repeated verbal disclaimers about the educational nature of the content.

Experience Authenticity9/10
I'm going to show you that 'oobe\bypassnro' ... is not recognized as an internal or external command. So that method is gone.
[01:45]

Demonstrates friction and failure of previous methods in real-time, proving he is testing on the latest software build rather than relying on outdated info.

Technical Depth9/10
Formidable explained
[19:18]

The discussion goes beyond the exploit itself to analyze the source code of the 'formidable' library, explaining the specific type confusion mechanism (string vs object) that enables the vulnerability.

Title-Content Alignment3/10
Zorin OS 18 2026 Revealed
[00:00]

The title frames the video as a future product reveal ('Zorin OS 18', '2026'), but the content is a standard installation tutorial for the currently available version (Zorin OS 17), making the title significantly misleading.

Categories
Automation & AgentsDeveloper PlatformsProductivityResearch ToolsSecurity & Privacy
Formats
TutorialsInterviews