You can spoof GUIDs/MACs and bounce off a unsecured host off the same subnet or even place
a trojan/udp proxy on the targets computer if he's dumb enough, so any thing is possible. The information he
has given is not proof positive of any one.. except that he found a cheater using a IP*s name.
![]()