It's not a transparent proxy if it's providing fake x-forwarded-for headers, it's just a regular old proxy.
And yes, you're a fucking moron. Spoof is not even remotely similar to proxy.
What is IP spoofing? - A Word Definition From the Webopedia Computer Dictionary
(ī-pē spoof´ing) (n.) A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then
modify the packet headers so that it appears that the packets are coming from that host.
IP address spoofing - Wikipedia, the free encyclopedia
In computer networking, the term IP address spoofing or IP spoofing refers to the
creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.[1]
What is IP spoofing (IP address forgery or a host file hijack)? - Definition from Whatis.com
IP spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a Web site, hijack browsers, or gain access to a network. Here's how it works: The hijacker obtains the IP address of a legitimate host and
alters packet headers so that the legitimate host appears to be the source.