Another term for this transition is Mac spoofing, which is done for legitimate and illicit purposes alike. Other times, you may want your device to appear as another one even though it is not. Sometimes, you may want your device to bypass access control lists on routers or servers to hide it from other networked devices and users.