David L. Jones (video blogger)
Australian video blogger
From Wikipedia, the free encyclopedia
David L. Jones is an Australian video blogger.[1][2] He is the founder and host of EEVBlog[3] (Electronics Engineering Video Blog), a blog and YouTube channel targeting electronics engineers, hobbyists, hackers, and makers.[1][4] His content has been described as a combination of "in-depth equipment reviews and crazy antics".[1]
- Dave Jones
- "The Crazy Aussie Bloke"
David L. Jones | |
|---|---|
David L. Jones in his electronics lab in January 2016 | |
| Other names |
|
| Occupation | Video blogger |
| YouTube information | |
| Channel | |
| Years active | 2009–present |
| Genre | Video blog |
| Subscribers | 993 thousand |
| Views | 217 million |
| Last updated: 14 April 2026 | |
| Website | www |
Life
Before becoming a full-time blogger, Jones worked on FPGA boards for the EDA company Altium.[5]
According to Jones, he began publishing electronic design project plans in electronics DIY magazines like Electronics Australia in the 1980s.[1] In recent years,[when?] several of his project articles appeared in Silicon Chip.[6]
Jones is also the founder and co-host of The Amp Hour,[3] an electronics engineering radio show and podcast.
EEVBlog
Batteriser incident
In a mid-2015 video, Jones disputed the claims of an unreleased battery life extender called Batteriser (later called Batteroo Boost after a lawsuit by Energizer). Batteroo, the company behind the product, disputed the arguments put forth by Jones and others, and published a number of demonstration videos in response.[8] In the wake of Jones' video about Batteriser, his video was "disliked" by a torrent of IP addresses located in Vietnam.[9] Other bloggers with related videos experienced similar activity from addresses in Vietnam. The bloggers involved have suspected that either a click farm in Vietnam was engaged to harm the reputations of those attacking the claims about the product, or that a single computer with many fake or stolen YouTube accounts utilized proxied IP addresses to cover its tracks.[10] Due to the anonymous nature of the attacks, it remains unknown who was responsible.[11]