I want to record my screen while I talk, but I would like to distort my voice like they do in the anonymous videos, to retain my anonymity. How can I do that? I’d rather not use a TTS engine as it would be difficult to synchronize the sound with the video of the screen. I just want to distort my voice enough so that people close to me couldn’t tell it’s me, assuming they aren’t experts and manage to reverse the voice distortion. And how do I share the video online without leaking my IP?

And, in a not so private way, what about real time streaming? I’ve seen a person who changed his voice and image so that it seemed as if Rocket from Guardians of the Galaxy was talking to you.

  • @Reaton@lemmy.ml
    link
    fedilink
    42 years ago

    Then you must carefully choose your VPN and blindfully trust that they’re not logging anything about you.

    • CHEF-KOCH
      link
      fedilink
      12 years ago

      I agree here, but that basically goes for everything, there are also malicious proxies, tor nodes, infected servers in general and whatnot.

      • @Reaton@lemmy.ml
        link
        fedilink
        12 years ago

        Yeah, I was just trying to say that the core concept of tor suits the case better but of course everything can be compromised

    • Jesse
      link
      fedilink
      02 years ago

      …and blindfully trust that they’re not logging anything about you.

      Isn’t that exactly what you are doing when using TOR? Those nodes can be compromised just as anything else can.

      • @Yujiri@lemmy.ml
        link
        fedilink
        12 years ago

        No Tor node knows both the origin and destination of traffic. The system was carefully designed to ensure this, so no, it’s not comparable at all.

          • @Yujiri@lemmy.ml
            link
            fedilink
            22 years ago

            Tor isn’t invincible but it’s much more difficult to track than a simple proxy or VPN because an adversary who compromises your proxy server or VPN can immediately see both the source and destination of your traffic, whereas traffic on Tor is routed through 3 different intermedaries, and not the same ones each time. Even if an attacker controlled your entry node, that wouldn’t tell them where your traffic is going or what it is. The attack described in that article requires the attacker to control both your destination and your entry node, and even then requires statistical analysis and for the victim to download a large file. I’m not aware of any anonymity system that makes tracking harder than Tor does, without requiring a trusted server operator.

            • Jesse
              link
              fedilink
              12 years ago

              Yeah, these are all good points. Tor is undoubtedly going to be better than a VPN.

      • @Reaton@lemmy.ml
        link
        fedilink
        -12 years ago

        As I said, yes everything can be compromised but at least tor nodes aren’t run by companies (at least not every one). Also tor has been made to anonymize users, It’s not the first purpose of a VPN. But as always we all must make some compromises.