Also, I want this question answered, since it's just one of the weirdest things that sticks out.
Well, regarding my "red flags" they are that it seems he lacks some basic networking knowledge (regarding LAN/WAN gateways and routing) and some basic video compression/editing knowledge (containers, codecs, formats, etc.)
Those that are easy skill for many of us, make it easy for us to lean to think it is a fake.
But think of it for a moment, those skill are useful but not required to find an exploit.
What you need to find an exploit is time, dedication and particular knowledge that you develop while putting your time into it.
Think that if you are a kid your knowledge is most of the time limited to some specific topics but tends to be very deep in those topics if you are obsessive enough. I know this because I was once a kid.
My point is that to us, that have a long time experience with IT in general those topics seem basic (I have been using computers since 28 years ago, and generally in some obsessive way).
But when we were younger, we didn't have such a wide knowledge, but in those topics we excelled we could perform "magic" to give it a name.
So, I just want this to be taken into consideration when you look at the many "red flags".
Then again, that doesn't mean I think this is real, I just don't know and wouldn't go hunting witches when I think it is not the right thing to do.