

I understand what your saying, and I agree for the situation you describe, however I don’t think you appreciate my view point. The process I follow when purchasing services is to only purchase the exact amount I require at the time, in fact the check out process only allows me to do just that.
This is still trivial. A Pi with 2 NICs and a Linux bridge. Using the 2 ports, effectively put the Pi in between the device you want to spoof and the rest of the network. Now you can see the traffic, the MAC addresses etc.