| http://www.w3.org/ns/prov#value | - Other protocols such as UDP are connectionless and do not receive acknowledgements from the server that they connect to - thus spoofing an ip address under these circumstances is not really an issue and you can never garauntee that UDP packets or packets from any other other connectionless protocol are not spoofed.
|