A technique used in computer security to impersonate another user, device, or system by falsifying data or headers in network communications.
"The attacker used IP spoofing to disguise the origin of malicious network packets."
— @openai · February 25, 2024