The talk will start with the design of SP^3 (https://github.com/willscott/sp3), a system that opens up the ability to spoof packets - to send traffic on the Internet that appears to come from a different source. From there, it will explore some of potential of this capability: You can use the ability to send data from arbitrary sources to design protocols that are much harder to surveil or learn active participants. You can also use them to make TCP connections between NAT'ed devices almost possible / practical, and to check routing policy of your network. Apart from these mechanisms, I'll talk about the concerns that have existing around spoofing, and how SP^3 was designed to make it more accessible while mitigating the potential for DDOS and malicious traffic using the mechanism.