Back with some more feedback, read through the whole thing this time (well up to sprites)
* I really like that you got rid of all those extended tests (which I hate). Exception is veracity checking, but that's okay, since its kind of like a race
* Fading seems kind of inconsistent,
1. when compiling or decompiling sprites Fading is increased + 1/2 sprite rating (compared to Mage/Spirit rules)
I assume the +1/2 sprite rating is a house rule and applies to Mages as well, but
2. when registering the hits are not doubled,
making it as cheap as compiling (why should I not do always then?) Typo?
3. Threading does not cause Fading,
how come you removed that? It seems logical to pay some prize for doing something better than normal. Especially, since you can use learned complex forms at will with no Fading, unlike spells.
4. Rend Icon does not cause Fading
Which makes it about as good as Crash (potentially better for starting elves), with no costs. I suggest Charisma/2 (downgradable with less damage)
5. Unravel causes Fading equal to " the number of hits on the highest original instruction set of the device"
This is a very unusual mechanic and would require a lot of bookkeeping, if properly enforced. Making it an attack-like ability against Firewall (+ Pilot? or Armor?) which deletes a random instruction if successful, would be much simpler gameplay, methinks. And is not overpowered compared to the Programs. Also you might consider adding LOS to the range. Back to Fading: using Enemy hits would be a nice tag along the compiling theme or give it a pseudo PR to stay in line with the programs; overall I like the effect and its making Decompiling a useful skill (with Rend Icon)
* I also really liked the "automatic" programs and cf you get, it is really frustrating to be dependant on programs (or worse cfs) for standard actions any decent OS should deliver free-house
* Minor note: You might want to add the role System plays in soaking D Damage in the System description
* Spam areas effecting TMs negatively seems out of flavor. Places like the Tokyo electronic district Akihabara brim with aggressive advertisement, I have some trouble believing that a TM would feel uncomfortable there. Maybe, it should be treated like correctly Aspected, positive Background count and allow bonus dice to Matrix activities, if appropriate.
* I would like to ask for some clarification concerning Forge Credentials, especially: what are the counterrolls (Firewall + Signal Defense or Device Rating for Scanners?); is it only for licences or can I forge a generic SIN for an identity check, if I assume the SIN should not be permanent;
* I am still not clear, when Matrix Stealth checks/re-checks are appropriate. I assume, whenever a target is interacted with in a non-beneficial way (e.g. by an analysis program). But then a Find Mind would trigger a lot of alarm, so maybe that's only appropriate for paranoid Hackers and too much slowing down the game speed. Still, I do not like being Backtracked by a Noob Hacker without the chance to notice it. But then, if he were such a Noob, he couldn't hide from me in the first place and I would notice it automatically. So Analysis on unassuming targets is okay, as long as it didn't see me the first time. Find Mind in a situation with many people in which a Find Mind is common (eg. a stadion) would be shrugged of, while it might blow your cover in a lone hide-and-seek-scenario with a TM.
* Hack an the fly has a weird speed. I usually do not keep track of free actions in an IP when I GM. Free Actions are for stuff that can be multitasked easily or is very fast and thus one, two or three of them that do not logically overlap (like talking twice) are usually okay by me. That aside, as an IT professional I can assure you that programming is neither mulitasked easily nor particularly fast. In fact, you need to concentrate very much, in order to "quick-program" anything with any hope of success. I can however verify that these attempts are better of deleted, even if they worked. I do not see how this would have changed within your paradigm. You still have to visualise very precisely what you want and how that can be achieved methodically, the rest is picked out from your brain, at least that reduces the amount of typos
The alternative would be to download a "free" program, which is adaquate for the task, but that is explicitly forbidden by your paradigm, as it would involve adjustment to the brain.
* Decrypt/Encrypt
How about that:
1. High-density transmission can be decrypted in real time, but require some time for adjustment. Roll Logic + Electronic Warfare in an extended roll (variable, 1 IP). The threshold is the original hits from the Encrypt, which may only be rerolled, if the Encrypter constantly and actively reuses Encrypt (Taking the CA (at least) every time the Decrypter succeeds and before he starts reading the transmission). Once the Decrypter wins, he can decrypt everything sent, until the connection is closed.
2. Low-density transmissions can be decrypted once enough data has been accumulated. When the GM decides that enough data is accumulated, it can be Decrypted by using a Complex action against the hits that were scored on the Encrypt. This roll is not repeatable.
3. Data can be Encrypted, similar to the use of a Data Bomb. The base time for Decrypting said data is Encrypt rating x (hits on the Encrypters rolled) / (hits the Decrypter rolled) in hours. The GM may increase the base time up to infinity when dealing with small amounts of data. Note that any data that is read or used by anyone is considered a transmission.
* Master Control: I don't see anyone buying this program as it's use is too situational, yet, it's a very nice way to resolve the problem without too many dice rolls. Why not make it a standard schtick of Hacking, along the lines of Forge Credentials. (That is not supposed to work on Humans, is it? It does have a D. )
* Did I miss anything or is the actual Exploit missing from the Exploit program list? How do I force a connection on a node, without knowing someone that node knows? Taxman? I thought that only gives me data but not a connection.
* Terminate Connection; I guess instead of "The user rolls Logic + Operations... " it should be "The user rolls Logic + Computer " Operations not having a rating and all.
* Registry Dump is a really nice idea, but poses the problem of bookkeeping all hits of all programs. Besides you might want to except Encrypt and Data Bomb or specifically mention that you can use it for that purpose.
* Reset is another one of those... Maybe you have to set a reset point first and only icons, connections and data still on the node are affected.
* Again my congratulations for making TMs really special with their compiling and decompiling cfs without nerfing Hackers too much or vice versa. Consider everything not mentioned as appreciated very much.
I hope you find my criticism constructive, if not, ignore the part you don't like. It was meant as a suggestion or was a mistake due to a misunderstanding on my side.
Sorry to everyone for the wall of text it started out quite innocently as a few paper scribblings