I want to record my screen while I talk, but I would like to distort my voice like they do in the anonymous videos, to retain my anonymity. How can I do that? I’d rather not use a TTS engine as it would be difficult to synchronize the sound with the video of the screen. I just want to distort my voice enough so that people close to me couldn’t tell it’s me, assuming they aren’t experts and manage to reverse the voice distortion. And how do I share the video online without leaking my IP?

And, in a not so private way, what about real time streaming? I’ve seen a person who changed his voice and image so that it seemed as if Rocket from Guardians of the Galaxy was talking to you.

  • @Yujiri@lemmy.ml
    link
    fedilink
    62 years ago

    I don’t know anything about voice changing, but for hiding your IP address I recommend using Tor or a proxy to upload to a place like Peertube

  • ᗪᗩᗰᑎ
    link
    fedilink
    32 years ago

    Not an expert at all in anonymizing audio, but I suspect anything “off the shelf” to mask your voice may be easy, or at least easy for experts, to undo. I would suggest instead to use a TTS engine and mask that instead. Here’s a list of decent - from my now ancient experience - TTS engines you may be able to use: https://linuxhint.com/command-line-text-speech-apps-linux/

    Regarding uploading without leaking your IP - you could use Tor, but ensure javascript is disabled and/or you completely trust the server you’re uploading to, lastly some people would advise that Tor has been long compromised, but take that with a grain of salt and wait for others with more recent knowledge/experience chime in.

    • Jesse
      link
      fedilink
      2
      edit-2
      2 years ago

      TTS is the way to go, but maybe a little inorganic to OP’s use case. It sounds like they want to do ankindnof follow-along video or something similar.

      Edit: heck, op should just do what we all used to do with unregistered hypercam 2 -> type in notepad haha

  • Arthur Besse
    link
    fedilink
    12 years ago

    It depends who you’re trying to hide from, and what their capabilities are.

    Here is a way that Tor or VPNs can fail you, even if you’re only trying to hide from an adversary much weaker than the NSA/GCHQ/etc.

    Suppose you simply want to hide your identity from your university (or perhaps a fellow student who works in the IT department there) when you upload a video from your dorm room - eg, using the university’s network. So, you use Tor or a VPN to upload to a peertube instance. For the sake of this scenario, lets say that the university is unable to convince the peertube instance operator to tell them the IP address where the video was uploaded from, so they don’t even know that Tor or a VPN was used. How could the university deanonymize you?

    By linking two pieces of information that they do have access to:

    1. They’ve seen the video, so they know its approximate filesize and they know the approximate time it was uploaded.

    2. They also most likely are retaining netflow data for all connections on their network.

    Netflow data is the number of bytes sent and received for each TCP or UDP 4-tuple (source and destination IP address and port number) in every time interval. The time resolution might be as high as sub-second or could be as low as 1 minute. But, even if it is very low resolution (like 1 minute), you’re probably the only person on the network who sent the approximate amount of data at the approximate time.

    Thinking about the above scenario might help you mentally model what you would need to do to resist stronger adversaries. An easy way to defeat the university adversary would be to not upload the video using their network. If you’re considering a state level adversary, you can’t really do that - they could be keeping netflow data (or even “full-take” - the content of all packets) at any ISP, and we know that they are at many (see XKeyscore, Tempora, etc).

    You could use some public wifi, but, where? Is there a CCTV camera at that cafe? Did you bring your phone, which is sharing your location with various advertising companies? Did you leave your phone at home, but suspiciously turned it off for the first time in a long time during the very hour the video was uploaded?

    Even for a single anonymous video publication, this is an extremely hard problem if you want to consider state-level adversaries. To maintain anonymity over time while continuing to publish under a persistent pseudonym is even harder. There are no easy answers. Hopefully the scenario above will help you in your threat modeling :)

  • CHEF-KOCH
    link
    fedilink
    1
    edit-2
    2 years ago

    Anonymous, and people who make Anon videos use a voice synthesizer (like Hawking, Siri, etc) so that there is no human fingerprint to it, but fsociety videos from Mr. Robot use human voices. YouTube has some guides that will show you how to do similar effects with Audacity. Just YouTube search for “audacity voice distortion.”

    Voice changer can be cracked once you know the used algorithm, I am mention it in case you try to do some shady stuff.

    As for the question to avoid leaking your IP, normal VPN will do.

    • @Yujiri@lemmy.ml
      link
      fedilink
      42 years ago

      Tor is a better way to hide your IP than a VPN (unless Tor exit nodes are blocked by the service you’re connecting to)

      • CHEF-KOCH
        link
        fedilink
        -42 years ago

        Better by what standards. Because you say so, nope. VPN is more than enough for this purpose, even Proxy will do unless the server side connection is not HTTPS.

        • @Reaton@lemmy.ml
          link
          fedilink
          42 years ago

          Then you must carefully choose your VPN and blindfully trust that they’re not logging anything about you.

          • CHEF-KOCH
            link
            fedilink
            12 years ago

            I agree here, but that basically goes for everything, there are also malicious proxies, tor nodes, infected servers in general and whatnot.

            • @Reaton@lemmy.ml
              link
              fedilink
              12 years ago

              Yeah, I was just trying to say that the core concept of tor suits the case better but of course everything can be compromised

          • Jesse
            link
            fedilink
            02 years ago

            …and blindfully trust that they’re not logging anything about you.

            Isn’t that exactly what you are doing when using TOR? Those nodes can be compromised just as anything else can.

            • @Yujiri@lemmy.ml
              link
              fedilink
              12 years ago

              No Tor node knows both the origin and destination of traffic. The system was carefully designed to ensure this, so no, it’s not comparable at all.

                • @Yujiri@lemmy.ml
                  link
                  fedilink
                  22 years ago

                  Tor isn’t invincible but it’s much more difficult to track than a simple proxy or VPN because an adversary who compromises your proxy server or VPN can immediately see both the source and destination of your traffic, whereas traffic on Tor is routed through 3 different intermedaries, and not the same ones each time. Even if an attacker controlled your entry node, that wouldn’t tell them where your traffic is going or what it is. The attack described in that article requires the attacker to control both your destination and your entry node, and even then requires statistical analysis and for the victim to download a large file. I’m not aware of any anonymity system that makes tracking harder than Tor does, without requiring a trusted server operator.

            • @Reaton@lemmy.ml
              link
              fedilink
              -12 years ago

              As I said, yes everything can be compromised but at least tor nodes aren’t run by companies (at least not every one). Also tor has been made to anonymize users, It’s not the first purpose of a VPN. But as always we all must make some compromises.

        • @Yujiri@lemmy.ml
          link
          fedilink
          12 years ago

          Most VPNs cost money and are drowned in dishonest marketing. Yes, Tor is slower but for an upload that’s not an isssue because you don’t do it constantly and it’s not time-sensitive

          Because you say so, nope

          Would you mind not putting words in my mouth?

          • CHEF-KOCH
            link
            fedilink
            -22 years ago

            ProtonVPN for example works without any money, it is a free VPN, same like CalyxVPN, so you do not get to decide what is - best - because there is no best. We are not having a debate about Tor Vs. VPN here, for his purposes a VPN, even Proxy will do, as said. Nothing to argue here. Just inform yourself better.

  • @questions@lemmy.ml
    link
    fedilink
    02 years ago

    All of you think you can just start a revolution and then get free shit.

    I’m here to tell you that’s not how it works.

    You need to grow a pair and work hard.

    Look at me I’m 36 years old and own 3 gyms. My girlfriend is a model. This is her.

    I worked hard for everything I have. I started with nothing and look at me now. Super fit, big tited girl friend and I’m not looking for hand outs.

    You all need to learn from me. You might not be as handsome so maybe you can’t have a Asian girl friend with big boobs but if you work hard at least you can have a girl friend. Probably.

    Revolution or not life ain’t easy. Be like me.

    • @FckTheNSA@lemmy.mlOP
      link
      fedilink
      02 years ago

      You are talking about revolution when I’m talking about streaming… Glad you are not at the CIA killing revolutionaries… As for your girlfriend you might as well post a picture of a mannequin the way you talk about her.