I want to record my screen while I talk, but I would like to distort my voice like they do in the anonymous videos, to retain my anonymity. How can I do that? I’d rather not use a TTS engine as it would be difficult to synchronize the sound with the video of the screen. I just want to distort my voice enough so that people close to me couldn’t tell it’s me, assuming they aren’t experts and manage to reverse the voice distortion. And how do I share the video online without leaking my IP?

And, in a not so private way, what about real time streaming? I’ve seen a person who changed his voice and image so that it seemed as if Rocket from Guardians of the Galaxy was talking to you.

  • CHEF-KOCH
    link
    fedilink
    -32 years ago

    Better by what standards. Because you say so, nope. VPN is more than enough for this purpose, even Proxy will do unless the server side connection is not HTTPS.

      • CHEF-KOCH
        link
        fedilink
        -32 years ago

        ProtonVPN for example works without any money, it is a free VPN, same like CalyxVPN, so you do not get to decide what is - best - because there is no best. We are not having a debate about Tor Vs. VPN here, for his purposes a VPN, even Proxy will do, as said. Nothing to argue here. Just inform yourself better.

    • @[email protected]
      link
      fedilink
      32 years ago

      Then you must carefully choose your VPN and blindfully trust that they’re not logging anything about you.

      • Jesse
        link
        fedilink
        02 years ago

        …and blindfully trust that they’re not logging anything about you.

        Isn’t that exactly what you are doing when using TOR? Those nodes can be compromised just as anything else can.

      • CHEF-KOCH
        link
        fedilink
        02 years ago

        I agree here, but that basically goes for everything, there are also malicious proxies, tor nodes, infected servers in general and whatnot.

        • @[email protected]
          link
          fedilink
          22 years ago

          Yeah, I was just trying to say that the core concept of tor suits the case better but of course everything can be compromised