

By bypassing all that they won’t immediately know who owned it through whatever machine IDs computers have on them.
There’s probably enough redundancy in such possibilities to track you not to care about this particular thing technically .
It’s just an insult to the user and they are assholes, dealing with assholes is a bad sign similar to black cats crossing your path. Don’t deal with assholes.
No need to explain this technically, you might think it’s better, but you are implicitly supporting the idea that without hard proof it’s fine that they are doing all those weird things. It’s not, you don’t have to prove anything. They are assholes, don’t deal with them, don’t keep taking insults. Simple.
Wouldn’t doing anything harder than usual be a flag about you then?