That's true. It's not worth Ravor and I re-hashing our debate here. There's a thread around here somewhere that you can dig out if you want to consider our arguments in favour of one interpretation or the other. I don't know if Ravor feels there is wiggle room for either interpretation to be valid, or if he feels that the rules clearly support that Agents / IC
must be running on the node they are active on is the only valid interpretation. In either case though, you need to decide how you will handle things as it will influence your system design. Briefly: my view is that an agent or IC can run on a node, e.g. a commlink and be active in another node just as a hacker's persona can. Ravor believes that for an agent to be active on a node it
must have either loaded (or been loaded) onto that node, thus potentially affecting the Response of that node, OR be accompanied by a living person in the form of their persona. Did I fairly summarise your case, Ravor? Please correct me if I have it wrong, it's been a while.
How you interpret this will affect how you deploy IC in your systems.
As Ravor says, the issue with Hacking is not necessarily whether you can get in, defeat IC, etc. But whether you can get in undetected. As Ravor says, if the system knows you are there then it can make life very difficult. One such way is going on Alert, either because the node has detected you hacking it, or because IC or a legitimate user has noticed you and raised the alert to the system. The most drastic way is for the node to shut down in self-defence. That may or may not be appropriate. You obviously don't want your security node going down (and taking the camera feeds with it), but for your accounts computer, or a research server containing important plans, it's a viable response. And the last thing your hacker needs is to find that they've now got to
carry a mainframe out of the building because it's refusing to talk to start up and let anyone copy data from it.

Two tips which I suspect you don't actually need, but which I'll mention because they're things that new GMs sometimes fall over, are as follows. Firstly, don't neglect the impact of multiple checks to detect the hacker. Some people take one look at the hacking rules, see that the PC has only a 20% chance of being detected when they hack in to node X and conclude that hacking is easy. They ignore that after being scanned by the fourth node, the chance of being detected has shot up to more than 50:50. Layering makes a big difference in a system based on probability. The second thing is to keep an NPC decker handy. It's perfectly legitimate for either support to be called in from an outside company if an alarm is raised, or even for a sysadmin or security consultant to be doing some late night work. So if things are going too smoothly or you want to liven things up, bring in some fresh opposition.
Oh, and don't neglect the joys of IC that's loaded with both Stealth and Track.

Hope all this is helping,
-K.