Cybersecurity Expert Answers Hacking Questions
Released on 05/12/2026
Just because someone's described as a script kiddie
doesn't mean they're not capable of doing a lot of damage.
Hi, I'm Allison Nixon, chief research officer at Unit 221B.
We specialize in tracking cybercriminals.
I'm here today to answer your questions from the internet.
This is Cybersecurity Support.
[upbeat music]
First up, this question is from piro_pyro.
The internet isn't just crowded with bots,
it's being silently taken over by them.
Think zombie apocalypse, but digital.
Hmm. This question is suspicious.
I see an em dash,
and I see an emoji at the end of this message.
I think this is a bot.
So I'm gonna take this bot's question at face value,
and I'm just gonna answer it.
In comment sections all across the internet,
there are a lot of bots that are posting nowadays.
These bots may be tasked with advertising a product
and spamming the comment section by saying,
Hey, this product is so great.
I use it all the time, and you can buy it here.
But there's also political bots as well,
and sometimes these are operated by nation states
who may be trying to manipulate
the population in another country
into voting a certain way or doing a certain thing.
They may be trying to stoke conflict.
And so as you're reading comments on the internet,
keep in mind there may be larger geopolitical situations
where they're treating you as a pawn.
Nobody has the problem under control.
It's a difficult issue to navigate.
When you're reading the comments section,
I would suggest that you find
a different source of information to base your opinions on,
like court documents or reports that happened
right after an incident happened,
rather than later on down the line.
It's really better for you to learn the facts
and then form your own opinions.
This question comes from slimboysam.
Scammers are using my voice with AI. What do I do?
So this question is describing a scam
where a elder family member may receive a phone call
where your voice may be manipulated with AI,
and the scammer may be telling your grandparents
or family member, Hey, I'm in a serious situation.
I need money right now. I'm injured, I'm hurt.
This is a big emergency.
So this is a very difficult situation
because oftentimes these scams
will try to prevent the victim
from contacting the family member
to actually verify that this happened.
And when you're in that situation,
it's very difficult to deal with.
But one thing that you can do
is before this scam hits you,
you can talk about these scams with your family members.
Say, Hey, there's a new scam going around.
Here's how it works. If you get this, let me know.
And this can be a good topic of conversation
to bond with your family members over as well,
and also keep each other safe.
So as you talk to your family members about the scam,
one thing that they can do is try to verify
that the person on the line is actually you.
Ask a question that only you would know.
So think very old past shared experience.
What's your favorite food? What was the first dog's name?
Another thing that your family member can do
is just hang up the phone and call you back on your number.
That may be very difficult to do in the moment,
but if you can discuss what your protocol is going to be
before this happens,
then if this scam does hit your family member,
they're gonna be more prepared
and they won't hand over the money.
So this question is from the privacy subreddit.
Can someone gain access to your phone activity
without coming in contact with it?
When someone gains access to your phone activity,
most of the time it will not involve them
coming into contact with your phone at all.
Usually the way people steal your information
is when your information is stored
on someone else's machine.
One place where your phone activity is stored
is at your phone company.
So when you make a phone call
or you send or receive a text message,
there's gonna be a record.
And if your phone company gets hacked
and those records get stolen,
that's one way that bad actors can figure out
what you're doing on your phone.
Also, you may have personal data on cloud accounts,
and when you're using your phone,
you're updating those cloud accounts with more information.
So if those accounts get hacked,
these actors can figure out what you're doing on your phone
without ever touching your phone.
One way to keep yourself safe is to be mindful
about how you secure your accounts in the cloud.
Make sure that you're not using the same password
across different websites.
Use a password manager.
Hopefully, store that password manager
on a machine you own and not in the cloud.
This is what we do.
This is a question from Idk1997283.
Anybody getting this wrong number text scams?
So the wrong number text scams is something
that a lot of people have been getting lately.
You receive a text from an unknown number
and it may say, Hello, John, and your name is not John.
After that first text, they'll say, Oh, wrong number.
And then they'll try to initiate a conversation with you.
These are part of organized crime operations
that are operated out of other countries,
and unfortunately, they have a history
of even enslaving people to force them to work these scams.
So when you receive a wrong number text scam,
I recommend that you don't interact with it.
Don't talk to the person, don't give them any money.
Also, don't insult them
because you don't know who's on the other end
and you don't know what kind of grizzly operation
is behind that text that you got.
This question is from Brickhau55.
Is Anonymous still around? LOL.
Yes, Anonymous is still around.
The original people that made up Anonymous,
they are older, they have mortgages, they have kids,
so you don't see them do the wild things
that they used to do
because they have lives that they need to live
and they've moved on from those early days.
So this question is from tyinsf.
Does SMS messages report spam do anything???
There may be a button that looks like three dots,
or there might be some kind of further information button
associated with that message.
So click on that button,
and you may see an option that says Report.
When you report a message on SMS
or any other platform honestly,
that goes to an entire ecosystem of cybersecurity employees
that review that information and aggregate it
and take notes and monitor for trends.
This is one of the last jobs that's going to be automated
because this job involves essentially human conflict
played out on the internet.
The scammers are continuously updating their scams
to try to bypass the anti-fraud and reporting mechanisms,
and the cybersecurity people are receiving these reports
and continuously updating the anti-fraud mechanisms
that the platforms have.
So when you receive a fraudulent message,
be sure to hit Report on those scam messages.
So this question
is from the explain like I'm five subreddit.
Is there any risk in snooping around the darknet?
If you do choose to look around on the darknet,
keep in mind that the biggest danger coming from the darknet
is not necessarily coming from technical threats,
but it's coming from human threats.
I generally don't recommend that you interact with anybody.
Keep in mind that the person on the other end
is likely a criminal,
and these are not normal social interactions.
These people will often try to manipulate you,
trick you, scam you.
There's a lot of cybercriminal forums,
socializing places where criminals tend to hang out,
talk about crime, share tips on how to do crime.
There's also ransom websites
where extortion groups will steal data from companies
and threaten companies
and then leak the company's private data.
Sometimes people go on the darknet for work,
to track what criminals are doing, what they're announcing,
what they're bragging about,
and to keep an eye out
for any mistakes they may have made in their communications.
So the darknet is a place of social activity.
It's definitely a dangerous forest.
If you wanna wander into it,
keep your eyes open, have someone watch your back.
Obviously keep your software updated.
Don't download or install weird things
that you find on the darknet.
You are literally interacting with criminals and mafias
and hostile countries.
So this question is from kjata30.
Don't click the link? Okay.
I clicked it, now what?
You may have just clicked on a weird, suspicious link
that you received over text message or email.
Sometimes people do
get weird messages with suspicious links,
and they may come from a legitimate sender
that just may be a little bit weird-looking.
So double check the sender,
and if it's something that you still think is suspicious,
definitely hit the Report button
on the message that you got.
That way it can go into the system,
and cybersecurity people can aggregate that
and look at that.
On the device that you clicked on that suspicious link,
ask yourself: when you visited that link,
did you input any of your personal information?
Did you download or install anything from that website?
Think about what happened after clicking that link.
And then that can help you understand
the next steps that you need to take.
So if you put a password into that website,
you need to change that password.
If you put your credit card number into that website,
you need to call your bank
and get your credit card number changed over
and talk to them.
If you have downloaded
or installed anything from that website,
you need to run a virus scan.
And depending on the situation,
it may be worth reinstalling your operating system.
In the best case scenario
where you may have clicked on that link
and then closed out of it immediately,
your risks are a whole lot less
than if you had inputted any information
or downloaded anything.
This question is from lemonsnicks.
Does it really matter
if I don't change my password regularly?
For accounts that you log into all the time,
a common practice is to change passwords
approximately every three months.
Now, this is a lot of work.
It's inconvenient, and nobody wants to do it.
If you have to pick
between changing your passwords regularly
versus using a unique password on every website,
I would say put your effort towards using a unique password
on every website.
Don't reuse any password across any website.
And the reason for this is,
when bad actors steal people's passwords,
they will try that same password
for the victim's account on a different website.
This is a common practice by attackers.
When you are changing your passwords,
you should focus on the most important
accounts that you have.
So your main personal email,
your work accounts, your banking,
and any accounts that you use
for communication with your friends.
Now, when you change those passwords,
a good practice is to use
something called a password manager
where you note down all of your accounts
and all of your passwords,
and then when you update your password,
you also need to update your password manager.
Typically, when you use a password manager,
you're gonna use one password
to unlock everything else on your password manager.
I prefer to use the ones
where you're storing your passwords on your own machine
and not in the cloud.
A Quora user asks, Are sextortion emails real?
A lot of people will receive emails
that say, Oh, I've got your naked pictures.
Give me money, or else I'll send them to your family.
These are sent to millions of people.
They are counting on a small number
of those millions of people
to think that it might be a real claim
because they might have a situation going on,
and they're relying on those few people to pay them out.
These kinds of scams are very damaging.
Keep in mind that these claims are almost always a lie.
Don't get emotionally wrapped up into this too much,
and don't pay these people.
There are also sextortion schemes where they may use AI
to create naked pictures of you.
If you are stuck in a situation like this,
it's not going to ruin your life.
Don't do anything drastic.
Just slow down, calm down, make rational decisions.
I understand that with social stigma,
it may be difficult for people to report this information.
If at all possible,
please try to find someone that you trust
that you can talk to privately about this matter.
Okay, so this is coming
from the explain like I'm five subreddit.
How does a government block its country's internet access?
When people are using the internet,
there's only a handful of companies in every country
that provide internet access,
and the government simply tells those companies
that you need to block these websites.
For example, in Iran,
where they're shutting down the entire internet,
the government has essentially
told the internet service providers in that country
to shut down the entire internet,
and under their laws they have to comply.
International law in cybercrime is very weak right now.
It's very much where countries determine their own laws.
And in situations like with Iran,
when they shut down the entire internet,
that's a less common scenario.
Most of the time,
countries are gonna block specific websites.
Sometimes this is because
the website criticized the government,
and in that country,
it's illegal to criticize the government.
Now in Western countries, when they block websites,
it's usually because the website may be associated
with fraud or harming the public.
So the intentions behind blocking websites
may also be different.
As a regular person,
if you don't like your country blocking websites,
you need to get involved politically
if you wanna keep the internet open and free
and able to access.
A Quora user asks, Do cybercriminals dump their phones
after committing crimes?
Yes, they do.
I have seen videos of cybercriminals smashing their phones,
running over their phones, setting their phones on fire.
It doesn't really help them.
Oftentimes, information is stored in the cloud
or on different devices,
or even if a phone is smashed,
the data inside of it can still be retrieved.
If the police really, really need to know something,
there are forensics teams
that can extract out the physical hardware,
pull out the chips and the boards
and read data off of chips bit by bit.
It's very expensive, very slow,
but if it's a really important case,
the police will pull out all the stops
and they'll figure out what they need to figure out.
So this question comes from zerostyle.
Best security training for aging parents?
Protecting against phishing, rogue links, other attacks.
So this is a very important topic.
When your aging parents
are getting new phones or new devices,
you can help them set up the devices
to be more locked down and more secure.
You can talk with them about how these devices can be used,
and make sure they know that they can call you anytime
if they have a question or they see something weird.
Also, another important thing
is new scams that are going around.
Oftentimes these scams target elderly people,
and if you learn about some new scam that's going around,
bring that up as a topic of conversation with your parents.
This will help them protect themselves.
So it's important to keep them educated,
and it's a great opportunity to talk to your parents.
You should call your mother sometime.
So this question is from Vision-Quest-9054.
What types of cybercrime exist besides hacking?
Hacking implies a technical kind of attack,
but a lot of cybercrime that happens nowadays
doesn't involve technical skills
or writing code or deploying code in any way.
Oftentimes, it involves just lying to people on the phone,
social engineering them,
tricking them into doing something
that they wouldn't otherwise do.
This is a question from Pure_Blank.
Why should I care about my data
getting stolen/sold/generally not being secure?
A common attitude that people may have
is they may not care about their data being stolen.
They may think, I'm not important, I'm not special.
The problem is if you have an income, if you have a job,
if you have anything worth stealing,
you are interesting to somebody.
You may not realize in the moment
how that data may be used against you,
but into the future, somebody might come up with a new idea
for this data in some kind of scheme.
When it's stolen, it's out there,
and it's not going to go away.
This question is from kaleighconners.
Why are hospitals more vulnerable to cyber threats?
So, hospitals are highly regulated.
They are using machines that are very complex,
used for medical procedures,
and as a result, you can't update the software very often.
Because security patches are not being deployed
as quickly as maybe your phone might receive them,
hospitals oftentimes have cybersecurity threats
that are unique to them.
Unfortunately, in addition
to hospitals being more vulnerable,
the consequences are worse when the hospitals get hacked.
There are people that have had their treatments delayed
or may have died
because they couldn't get treatment in a hospital
because of a hack.
The cybersecurity situation with hospitals
I feel is getting worse over the years.
Cybercriminal gangs have deliberately targeted them
more than they used to.
The police will often prioritize attacks against hospitals,
and any cybercriminals that are engaged
in that kind of activity often get arrested more quickly.
This question is from SakuraMikuuu.
Is it possible to hack someone through Wi-Fi?
If this Wi-Fi is in your home
and nobody else has access to your devices,
you can be a lot more confident in it.
If you're on a public Wi-Fi at a coffee shop
and there's all kinds of unknown people
also on the same Wi-Fi,
there's a little bit more risk.
Now, one thing to keep in mind
is the situation is a lot better than it used to be.
The typical machine that you're going to use
will detect tampering and refuse to even operate.
Now that said,
there's a lot of innovative, advanced attacks out there.
I can't guarantee
that you're gonna be totally safe on public Wi-Fi,
but nowadays, when cybercriminals are attacking victims,
they're using some kind of scheme
where they can affect thousands of victims,
and that just doesn't involve public Wi-Fi.
So a Quora user asks,
Could cyber terrorists be as dangerous
as the gun-wielding terrorists,
or are they just a bunch of geeks?
So the answer is, why not both?
One thing to keep in mind about the internet,
people are conditioned to not take it seriously,
but the problem is that the internet allows you
to connect globally with anybody.
So a bad actor can connect with millions of people.
If they did that with malicious intent,
that could cause harm
against millions of people across the world.
And there are gangs operating nowadays
that are using the internet to commit violence
and to mass recruit people into committing violence.
And this is something
that governments are taking very seriously,
and I think the general public should also take seriously.
So this question is from ZeroEdge_io.
Friend asks, What do hackers actually do?
Me says, 70% Googling, 20% reading documentation,
10% looking cool in terminal.
When I'm answering this question
of what do hackers actually do,
I'm trying to describe the non-criminal version of hackers.
The term hacker is a bit confusing and controversial.
People use the same term to mean two very different things.
On one hand, hacker can be used to describe a cybercriminal
where they are abusing computers in order to abuse people.
Another way that people use the term hacking
is to describe a non-criminal person
just exploring what their computer is capable of doing,
figuring out neat technical tricks that nobody else knows.
So a common way that people may engage in hacking
that is fun and non-criminal
is when kids are cheating at video games.
And I don't mean downloading cheats that someone else wrote.
I mean manipulating the memory in your computer,
maybe changing the files on your own computer,
just exploring for yourself.
This is the kind of exploration
that children commonly engage in
that could be considered hacking.
But if there's no victim,
it may be a safe activity to engage in.
Now, if you're a kid watching this,
double check with an adult,
don't just run off and do something crazy
and say that I told you to do it.
A question by Swings_Subliminals.
The line between script kiddie and hacker???
Script kiddie is basically an insult.
It's used to describe people
that don't understand the systems that they're exploiting.
They don't know how to read or understand code,
but they will download exploits from the internet
and try to hack just by pressing a button.
Just because someone's described as a script kiddie
doesn't mean they're not capable of doing a lot of damage.
The term hacker is a little bit controversial.
It's used by people to describe cybercriminals
that hack illegally into computers.
It's also used to describe people
that work in the cybersecurity industry
who do not break the law,
but figure out innovative, clever ways to use computers
that wasn't anticipated,
and use those skills to make the world more secure.
This question is from ZanzerFineSuits.
How do companies know that hackers stole data?
And the person says, It's not like the data disappears,
like if someone steals your car.
They just copy it.
How does any company know
what data was actually stolen, if any?
So there's a lot of different ways
that companies know about this.
Oftentimes with the extortion groups
that are operating right now,
they will just tell the company that they stole the data.
That will also come inside of a ransom note
where they are threatening the company and demanding money.
Oftentimes with these extortion groups,
they actually do delete the company's
copy of the data as well.
When they're operating these schemes,
they've realized that they can make more money
by destroying the company on the way out.
This question is from Intelligent-Way1288.
At what point is hacking considered illegal?
So there is a law called the Computer Fraud and Abuse Act.
It was passed in the 1980s.
It defines what is illegal computer hacking versus not.
And when police are trying to determine
if a certain behavior is illegal or not,
usually the metric they go by is whether or not
the behavior is destroying someone else's property,
stealing someone else's money, causing harm to a person.
If you wanna experiment with computers
and do weird things that may break a computer,
do it to your own computer.
Just in general, don't be a bad person on the internet,
and that significantly reduces your risk.
This question comes from 747269737616E.
What's happening when two countries
launch cyberattacks on one another?
So launching a cyberattack
is not quite the same as launching a missile.
It very much depends on the situation.
One thing that we've seen in recent conflicts
is cyberattacks that may be done
in conjunction with a physical attack.
So it may enhance a physical attack.
So for example, traffic cameras in a city may be hacked,
and the hackers working for the nation state
may be monitoring the cameras
to see what kind of activity is happening on the street.
That knowledge may be used to inform missile strikes
or an invasion of people.
This is often how we see cyberattacks play out
in real-world conflicts.
This is from the privacy subreddit.
Why do police and governments
have so much trouble getting into iPhones?
They have a lot of trouble getting into iPhones
because iPhones were designed
to make it very difficult to get into.
It's as simple as that.
Different products available to the consumer
have different design features, different selling points,
and the people that want to buy an iPhone
often wanna have a phone
that's more locked down and more secure.
The people that wanna buy
other competitor phones like Android,
they may be more interested in the freedom
to do what they want on their phone.
Now, there's trade-offs with that.
If you wanna do creative, unusual things with your phone,
that opens up functionality
that could also be used by governments and police
to break into your phone and pull out your encrypted data.
Do you wanna have a more secure, locked down machine
that you can't do a lot with?
Or do you wanna have a machine you can do a lot with?
But there are security risks associated
with those abilities.
It's up to you.
So this question comes from BadKarma-18.
People who work in cybersecurity or are hackers themselves,
how do data breaches happen?
Most of the time it's because some criminal actor
figured out an exploit that the company didn't fix yet,
or perhaps tricked an employee into providing a credential
or stealing a credential from an employee
and then abusing the employee's access to steal data.
The answer to this question changes a lot over time.
There is a constant discovery
of new mechanisms to steal data,
and companies are constantly fixing all of these exploits.
So this question is from hr9383.
How does law enforcement track down cybercriminals
who use public Wi-Fi and VPNs to commit illegal activities?
So nowadays, when it comes to catching cybercriminals,
VPNs, public Wi-Fi,
it's not actually a barrier to catching them.
Catching them involves waiting for them to make a mistake.
Cybercriminals love to brag. They love to show off.
There's a lot of footprints they leave behind
that may not necessarily be contained
within their encrypted devices.
And oftentimes when cybercriminals get caught,
it's because of something
that has nothing to do with encryption or data protection.
Every case is unique
when it comes to catching cybercriminals,
and it's often a battle of wits.
It's quite interesting work, honestly.
So this question is from dumbgirlbrooke.
So how do VPNs work?
It's like using a proxy.
So say you have a message that you wanna send to a website,
but you don't wanna be the one actually sending it.
You may pass that message to someone else's machine,
say, operated by a VPN company,
and then that machine will pass that message to the website.
So a VPN is a way to hide your IP address online.
And the way that it accomplishes that
is that you're using someone else's IP address instead.
Now, there's a lot of advertisements
that are gonna tell you this is how you get more secure,
but unfortunately, VPNs also increase risk as well.
When you're sending all of your traffic
through someone else's machine
so that you can use their IP address instead of yours,
that other person's machine may be looking at your traffic,
they may be hacked, they may have other issues.
So as you are making your cybersecurity choices,
you need to weigh all these different risks
against each other.
So this question is from Malwarebeasts.
Did shutting down cybercrime forums
like RaidForums and BreachForums
reduce crime or just scatter it?
So the answer to that is both.
Cybercrime is something that's not gonna be solved,
just like regular crime in society, but it can be reduced.
And the actual strategy of fighting cybercrime
is one where you need to both suppress it,
arrest bad actors,
shut down infrastructure where bad actors are congregating,
and scattering them is a positive step forward.
Reducing cybercrime is also a positive step forward,
and all of these different tactics
are part of a larger strategy of fighting cybercrime.
That's all for today. Hope you learned something.
Stay safe out there,
and thanks for watching Cybersecurity Support.
Starring: Allison Nixon
Gordon Ramsay Answers Cooking Questions From Twitter
Ken Jeong Answers Medical Questions From Twitter
Bill Nye Answers Science Questions From Twitter
Blizzard's Jeff Kaplan Answers Overwatch Questions From Twitter
Nick Offerman Answers Woodworking Questions From Twitter
Bungie's Luke Smith Answers Destiny Questions From Twitter
Jackie Chan & Olivia Munn Answer Martial Arts Questions From Twitter
Scott Kelly Answers Astronaut Questions From Twitter
LaVar Ball Answers Basketball Questions From Twitter
Dillon Francis Answers DJ Questions From Twitter
Tony Hawk Answers Skateboarding Questions From Twitter
Jerry Rice Answers Football Questions From Twitter
Garry Kasparov Answers Chess Questions From Twitter
U.S. Olympic and Paralympic Athletes Answer Olympics Questions From Twitter
Neuroscientist Anil Seth Answers Neuroscience Questions From Twitter
Blizzard's Ben Brode Answers Hearthstone Questions From Twitter
John Cena Answers Wrestling Questions From Twitter
The Slow Mo Guys Answer Slow Motion Questions From Twitter
Bill Nye Answers Even More Science Questions From Twitter
James Cameron Answers Sci-Fi Questions From Twitter
Best of Tech Support: Bill Nye, Neil DeGrasse Tyson and More Answer Science Questions from Twitter
Riot Games' Greg Street Answers League of Legends Questions from Twitter
Riot Games' Greg Street Answers Even More League of Legends Questions from Twitter
PlayerUnknown Answers PUBG Questions From Twitter
Liza Koshy, Markiplier, Rhett & Link, and Hannah Hart Answer YouTube Creator Questions From Twitter
NCT 127 Answer K-Pop Questions From Twitter
Neil deGrasse Tyson Answers Science Questions From Twitter
Ken Jeong Answers More Medical Questions From Twitter
Bon Appétit's Brad & Claire Answer Cooking Questions From Twitter
Bang Bang Answers Tattoo Questions From Twitter
Ed Boon Answers Mortal Kombat 11 Questions From Twitter
Nick Jonas and Kelly Clarkson Answer Singing Questions from Twitter
Penn Jillette Answers Magic Questions From Twitter
The Russo Brothers Answer Avengers: Endgame Questions From Twitter
Alex Honnold Answers Climbing Questions From Twitter
Sloane Stephens Answers Tennis Questions From Twitter
Bill Nye Answers Science Questions From Twitter - Part 3
Astronaut Nicole Stott Answers Space Questions From Twitter
Mark Cuban Answers Mogul Questions From Twitter
Ubisoft's Alexander Karpazis Answers Rainbow Six Siege Questions From Twitter
Marathon Champion Answers Running Questions From Twitter
Ninja Answers Fortnite Questions From Twitter
Cybersecurity Expert Answers Hacking Questions From Twitter
Bon Appétit's Brad & Chris Answer Thanksgiving Questions From Twitter
SuperM Answers K-Pop Questions From Twitter
The Best of Tech Support: Ken Jeong, Bill Nye, Nicole Stott and More
Twitter's Jack Dorsey Answers Twitter Questions From Twitter
Jodie Whittaker Answers Doctor Who Questions From Twitter
Astronomer Jill Tarter Answers Alien Questions From Twitter
Tattoo Artist Bang Bang Answers More Tattoo Questions From Twitter
Respawn Answers Apex Legends Questions From Twitter
Michael Strahan Answers Super Bowl Questions From Twitter
Dr. Martin Blaser Answers Coronavirus Questions From Twitter
Scott Adkins Answers Martial Arts Training Questions From Twitter
Psychiatrist Daniel Amen Answers Brain Questions From Twitter
The Hamilton Cast Answers Hamilton Questions From Twitter
Travis & Lyn-Z Pastrana Answer Stunt Questions From Twitter
Mayim Bialik Answers Neuroscience Questions From Twitter
Zach King Answers TikTok Questions From Twitter
Riot Games Answers League of Legends Questions from Twitter
Aaron Sorkin Answers Screenwriting Questions From Twitter
Survivorman Les Stroud Answers Survival Questions From Twitter
Joe Manganiello Answers Dungeons & Dragons Questions From Twitter
"Star Wars Explained" Answers Star Wars Questions From Twitter
Wizards of the Coast Answer Magic: The Gathering Questions From Twitter
"Star Wars Explained" Answers More Star Wars Questions From Twitter
VFX Artist Answers Movie & TV VFX Questions From Twitter
CrossFit Coach Answers CrossFit Questions From Twitter
Yo-Yo Ma Answers Cello Questions From Twitter
Mortician Answers Cadaver Questions From Twitter
Babish Answers Cooking Questions From Twitter
Jacob Collier Answers Music Theory Questions From Twitter
The Lord of the Rings Expert Answers More Tolkien Questions From Twitter
Wolfgang Puck Answers Restaurant Questions From Twitter
Fast & Furious Car Expert Answers Car Questions From Twitter
Former FBI Agent Answers Body Language Questions From Twitter
Olympian Dominique Dawes Answers Gymnastics Questions From Twitter
Allyson Felix Answers Track Questions From Twitter
Dr. Michio Kaku Answers Physics Questions From Twitter
Former NASA Astronaut Answers Space Questions From Twitter
Surgeon Answers Surgery Questions From Twitter
Beekeeper Answers Bee Questions From Twitter
Michael Pollan Answers Psychedelics Questions From Twitter
Ultramarathoner Answers Questions From Twitter
Bug Expert Answers Insect Questions From Twitter
Former Cult Member Answers Cult Questions From Twitter
Mortician Answers MORE Dead Body Questions From Twitter
Toxicologist Answers Poison Questions From Twitter
Brewmaster Answers Beer Questions From Twitter
Biologist Answers Biology Questions From Twitter
James Dyson Answers Design Questions From Twitter
Dermatologist Answers Skin Questions From Twitter
Dwyane Wade Answers Basketball Questions From Twitter
Baker Answers Baking Questions from Twitter
Astrophysicist Answers Questions From Twitter
Age Expert Answers Aging Questions From Twitter
Fertility Expert Answers Questions From Twitter
Biological Anthropologist Answers Love Questions From Twitter
Mathematician Answers Math Questions From Twitter
Statistician Answers Stats Questions From Twitter
Sleep Expert Answers Questions From Twitter
Botanist Answers Plant Questions From Twitter
Ornithologist Answers Bird Questions From Twitter
Alex Honnold Answers MORE Rock Climbing Questions From Twitter
Former FBI Agent Answers MORE Body Language Questions From Twitter
Waste Expert Answers Garbage Questions From Twitter
Garbage Boss Answers Trash Questions From Twitter
J. Kenji López-Alt Answers Cooking Questions From Twitter
Veterinarian Answers Pet Questions From Twitter
Doctor Answers Gut Questions From Twitter
Chemist Answers Chemistry Questions From Twitter
Taste Expert Answers Questions From Twitter
Paleontologist Answers Dinosaur Questions From Twitter
Biologist Answers More Biology Questions From Twitter
Biologist Answers Even More Biology Questions From Twitter
ER Doctor Answers Injury Questions From Twitter
Toxicologist Answers More Poison Questions From Twitter
Energy Expert Answers Energy Questions From Twitter
BBQ Pitmaster Answers BBQ Questions From Twitter
Neil Gaiman Answers Mythology Questions From Twitter
Sushi Chef Answers Sushi Questions From Twitter
The Lord of the Rings Expert Answers Tolkien Questions From Twitter
Audiologist Answers Hearing Questions From Twitter
Marine Biologist Answers Shark Questions From Twitter
Bill Nye Answers Science Questions From Twitter - Part 4
John McEnroe Answers Tennis Questions From Twitter
Malcolm Gladwell Answers Research Questions From Twitter
Financial Advisor Answers Money Questions From Twitter
Stanford Computer Scientist Answers Coding Questions From Twitter
Wildlife Vet Answers Wild Animal Questions From Twitter
Climate Scientist Answers Earth Questions From Twitter
Medical Doctor Answers Hormone Questions From Twitter
James Hoffmann Answers Coffee Questions From Twitter
Video Game Director Answers Questions From Twitter
Robotics Professor Answers Robot Questions From Twitter
Scam Fighters Answer Scam Questions From Twitter
Forensics Expert Answers Crime Scene Questions From Twitter
Chess Pro Answers Questions From Twitter
Former FBI Agent Answers Body Language Questions From Twitter...Once Again
Memory Champion Answers Questions From Twitter
Neuroscientist Answers Illusion Questions From Twitter
Immunologist Answers Immune System Questions From Twitter
Rocket Scientists Answer Questions From Twitter
How Vinyl Records Are Made (with Third Man Records)
Neurosurgeon Answers Brain Surgery Questions From Twitter
Therapist Answers Relationship Questions From Twitter
Polyphia's Tim Henson Answers Guitar Questions From Twitter
Structural Engineer Answers City Questions From Twitter
Harvard Professor Answers Happiness Questions From Twitter
A.I. Expert Answers A.I. Questions From Twitter
Pizza Chef Answers Pizza Questions From Twitter
Former CIA Chief of Disguise Answers Spy Questions From Twitter
Astrophysicist Answers Space Questions From Twitter
Cannabis Scientist Answers Questions From Twitter
Sommelier Answers Wine Questions From Twitter
Mycologist Answers Mushroom Questions From Twitter
Genndy Tartakovsky Answers Animation Questions From Twitter
Pro Card Counter Answers Casino Questions From Twitter
Doctor Answers Lung Questions From Twitter
Paul Hollywood & Prue Leith Answer Baking Questions From Twitter
Geneticist Answers Genetics Questions From Twitter
Sneaker Expert Jeff Staple Answers Sneaker Questions From Twitter
'The Points Guy' Brian Kelly Answers Travel Questions From Twitter
Master Chef Answers Indian Food & Curry Questions From Twitter
Archaeologist Answers Archaeology Questions From Twitter
LegalEagle's Devin Stone Answers Law Questions From Twitter
Todd McFarlane Answers Comics Questions From Twitter
Reptile Expert Answers Reptile Questions From Twitter
Mortician Answers Burial Questions From Twitter
Eye Doctor Answers Eye Questions From Twitter
Computer Scientist Answers Computer Questions From Twitter
Neurologist Answers Nerve Questions From Twitter
Hacker Answers Penetration Test Questions From Twitter
Nutritionist Answers Nutrition Questions From Twitter
Experts Predict the Future of Technology, AI & Humanity
Doctor Answers Blood Questions From Twitter
Sports Statistician Answers Sports Math Questions From Twitter
Shark Tank's Mark Cuban Answers Business Questions From Twitter
Marvel’s Spider-Man 2 Director Answers Video Game Questions From Twitter
Criminologist Answers True Crime Questions From Twitter
Physicist Answers Physics Questions From Twitter | Tech Support
Chess Pro Answers More Questions From Twitter
The Police's Stewart Copeland Answers Drumming Questions From Twitter | Tech Support
Ancient Rome Expert Answers Roman Empire Questions From Twitter
Mathematician Answers Geometry Questions From Twitter | Tech Support
Toy Expert Answers Toy Questions From Twitter | Tech Support
Pepper X Creator Ed Currie Answers Pepper Questions From Twitter
Mineralogist Answers Gemstone Questions From Twitter | Tech Support
Jacob Collier Answers Instrument & Music Theory Questions From Twitter | Tech Support
Mechanical Engineer Answers Car Questions From Twitter
Dermatologist Answers More Skin Questions From Twitter | Tech Support
Egyptologist Answers Ancient Egypt Questions From Twitter
Cardiologist Answers Heart Questions From Twitter | Tech Support
Marine Biologist Answers Fish Questions From Twitter | Tech Support
Real Estate Expert Answers US Housing Crisis Questions | Tech Support
Paleoanthropologist Answers Caveman Questions From Twitter | Tech Support | WIRED
Zack Snyder Answers Filmmaking Questions From Twitter | Tech Support
Survivalist Answers Survival Questions From Twitter | Tech Support
Celebrity Trainer Answers Workout Questions From Twitter | Tech Support
Primatologist Answers Ape Questions From Twitter | Tech Support
Psychiatrist Answers Mental Health Questions From Twitter | Tech Support
Maya Expert Answers Maya Civilization Questions From Twitter | Tech Support
Biomedical Scientist Answers Pseudoscience Questions From Twitter
Violinist Answers Violin Questions From Twitter
Lando Norris & Oscar Piastri Answer Formula 1 Questions From Twitter
Medievalist Professor Answers Medieval Questions From Twitter
Stock Trader Answers Stock Market Questions From Twitter
Pyrotechnician Answers Fireworks Questions From Twitter
Storm Chaser Answers Severe Weather Questions From Twitter
Professor Answers Ancient Greece Questions From Twitter
AI Expert Answers Prompt Engineering Questions From Twitter
Etiquette Expert Answers Etiquette Questions From Twitter
'Pod Save America' Hosts Answer Democracy Questions From Twitter
Roller Coaster Engineer Answers Roller Coaster Questions From Twitter
Urban Designer Answers City Planning Questions From Twitter
Joey Chestnut Answers Competitive Eating Questions From Twitter
Aerospace Engineer Answers Airplane Questions From Twitter
Microbiologist Answers Microbiology Questions From Twitter
Viking Age Expert Answers Viking Questions From Twitter
Volcanologist Answers Volcano Questions From Twitter
Private Investigator Answers PI Questions
Neuroscientist Answers Emotion Questions
Historian Answers Wild West Questions
Linguist Answers Word Origin Questions
Historian Answers Witchcraft Questions
Scammer Payback Answers Scam Questions
Urban Designer Answers More City Planning Questions
Historian Answers Pirate Questions
Cult Deprogrammer Answers Cult Questions
Historian Answers Samurai Questions
Demographics Expert Answers Population Questions
Air Crash Investigator Answers Aviation Accident Questions
Arctic Explorer Answers Polar Expedition Questions
Presidential Historian Answers Presidency Questions
Pregnancy Doctor Answers Pregnancy Questions
Paleontologist Answers Extinction Questions
Football Historian Answers Football Questions
Biomedical Scientist Answers New Pseudoscience Questions
Psychologist Answers Couples Therapy Questions
Clinical Pharmacist Answers Pharmacology Questions
Historian Answers Renaissance Questions
Dungeon Master Brennan Lee Mulligan Answers DnD Questions
Surgeon Answers Transplant Questions
Keanu Reeves Answers Motorcycle Questions With Gard Hollinger
History Professor Answers Dictator Questions
Professor Answers AI Questions
Comedian Matteo Lane Answers Stand-Up Questions
Professor Answers Supply Chain Questions
LegalEagle's Devin Stone Answers Criminal Law Questions
Doctor Answers Physical Therapy Questions
Historian Answers Cold War Questions
Cheating Expert Answers Casino Cheating Questions
Sexuality Professor Answers Dating Questions
Cybersecurity Expert Answers Hacking History Questions
Farmer Answers Farming Questions
Entomologist Answers Insect Questions
Boating Expert Answers Boat Questions
Film Historian Answers Old Hollywood Questions
Professor Answers Neurodiversity Questions
Paleontologist Answers Fossil Questions
David Guetta Answers DJ Questions
Law Professor Answers Supreme Court Questions
Astrobiologist Answers Astrobiology Questions
Political Scientist Answers China Questions
Biomedical Scientist Answers More Pseudoscience Questions
Nuclear Historian Answers Nuclear War Questions
Teacher Answers Teacher Questions
CEO Answers Startup Questions
Harvard Professor Answers Middle East Questions
Jon Batiste Answers Piano Questions
Immigration Lawyer Answers Immigration Questions
Neurosurgeon Answers Brain-Computer Interface Questions
Historian Answers Latin American History Questions
Kevin O'Leary Answers Investor Questions
Engineering Professor Answers Electric Car Questions
Language Expert Answers English Questions
Historian Answers Folklore Questions
Historian Answers Native American Questions
Economics Professor Answers Great Depression Questions
Historian Answers Revolution Questions
Max Verstappen Answers F1 Driver Questions
Mercedes CEO Answers F1 Team Principal Questions
Alex Honnold Answers Rock Climbing Questions
Army Historian Answers World War II Questions
Doctor Answers Vaccine Questions
Professor Answers Coding Questions
Historian Answers Victorian England Questions
Hideo Kojima Answers Hideo Kojima Questions
Doctor Answers Longevity Questions
Professor Answers Television History Questions
Jacques Torres Answers Chocolatier Questions
Astronomer Answers Cosmos Questions
Supply Chain Expert Answers Chinese Manufacturing Questions
Professor Answers Olympic History Questions
Paralympian Answers Paralympics Questions
Olympian Answers Figure Skating Questions
Collectibles Expert Answers Collectibles Questions
Your Rich BFF Vivian Tu Answers Personal Finance Questions
Voice Acting Legend Jim Cummings Answers Voice Acting Questions
Finance Professor Answers Investing Questions
F1 Chief Mechanic Answers F1 Car Questions
Doctor Answers Women's Health Questions
Doctor Answers Surrogacy Questions
Former Deputy National Security Advisor Answers Geopolitics Questions
Professional Birder Answers Birding Questions
Self Defense Expert Answers Self Defense Questions
Home Inspector Answers House Safety Questions
Harvard Professor Answers Iran War Questions
Harvard Professor Answers Iranian Government Questions
Harvard Professor Answers Iranian History Questions
Caltech Professor Answers Robotics Questions
Doctor Answers Lung Questions
Architect Answers Architecture Questions
Cybersecurity Expert Answers Hacking Questions