Thinker
Cybercrime, hacking history, and digital espionage with a focus on narrative storytelling and forensic timelines.
Nutrition Label
Thinker produces polished, narrative-driven documentaries focused on high-profile cybercrimes, hacking incidents, and digital espionage. The content excels at synthesizing public records into compelling stories with high transparency regarding sponsorships and dramatization. Viewers should expect well-researched summaries of historical or news events rather than first-hand forensic investigations.
Strengths
- +
- +
- +
Notes
- !Videos are narrative retellings of past events based on public records rather than primary investigations.
- !Check the description for specific disclaimers regarding the dramatization of conversations and narrative details.
Rating Breakdown
Breakdown across the key dimensions we rate. Methodology →
Recent Videos

Hunting A $500,000,000 Crypto Scammer

How 75 Cents Exposed a Russian Spy Operation

Hunting A Dark Web Insider Trader

Hunting A $300,000,000 Dark Web Drug Dealer

Hunting the $477,000,000 FTX Hacker

How North Korean Spies Infiltrated the US

The First Cyber Bank Heist In History

Hunting The Dark Webs Biggest Villain

Gary Mckinnon: The Hacker Who Found UFOs

The Legendary Lottery Hack

The Hacker Who Sold Weapons (ASTRA)

North Koreas Secret Hacking Unit (Lab110 Documentary)

The Dark Truth About OceanGate (Documentary)

How Hackers Stole $50,000,000 From The US Government

Who Is Bombing Europe's ATMs?
Why this rating
Evidence receipts showing why each dimension is rated the way it is.
“Use code THINKER at the link below and get 60% off annual plans”[Description] →
Clear and explicit disclosure of the affiliate code and material connection in the video description.
“KnowBe4 released a blog post detailing how they accidentally hired a North Korean spy.”[0:38] →
The video anchors its narrative in specific primary sources, visually citing the company's official statement and later DOJ indictments.
“He wrote a tiny Perl script... to scan for blank passwords.”[02:15] →
Correctly identifies the 'hack' as a mundane exploitation of poor security (blank passwords) rather than Hollywood-style decryption, adding technical realism.
“In this video, we uncover how he built a decentralized empire...”[0:30] →
The narrative is a third-person retrospective retelling of past events, lacking first-hand investigative participation or direct experience with the subject.