Operation
Does the use of VOX PROTECT require an authorization key?
Yes, we have an agreement with PACE ANTI-PIRACY with their I-loK key system. It would be best to have an I-lok key to load the VOX PROTECT authorization onto it. If you do not have this key system. You must acquire it on the site: https://www.ilok.com by creating a...
What are the recommended "buffer" preferences?
We recommend a computer with a minimum of 32 GB RAM. We recommend the following preference criteria : -For Protools, Set Up/Playback Engine/HW Buffer Size :1024 samples /Cache Size: Normal -For Audition, Preferences/Audio Hardware/SW Buffer Size and Available Ram...
How do you achieve a satisfactory level of protection?
We have defined two levels of protection in the software (plug-in): -The first level of protection, "Low level of protection" corresponds to weak security. This protection is more reliable than a common effect such as pitch. Indeed, the result found cannot...
How does VOX PROTECT work?
The software is a plug-in. It is therefore integrated into video or audio editing software. See the list of software compatible with VOX PROTECT: "SPECS" To find out how it works, watch the wwwuct video
Why does VOX PROTECT protect more than the other effects used?
VOX PROTECT has been created for this specific use. It required 4 years of reflection, research and development Therefore, It is the only software (plug-in), to date, dedicated solely to the protection of witness' voices. Its design protects the witness' identity, the...