QUOTE (Hermit)
You don't have to be there in person. Just use a relay. As anything is wireless-enabled in SR4, you can use anything, really, and something wireless-enabled will always be near enough to your cyberware to use it for relaying a hack in an urban setting. You could just hack the lamp or storey display in an elevator the character happens to be in, the self-adjusting armchair, or the TV remote, and you're close enough to hack his cyberware without having to access through his commlink.
I see several problems with this. Let's starting with the TV remote. What TV remote? There are no TV remotes by SR4 because you can simply control your Trid set with your commlink. You already are carrying your commlink around everywhere you go, so it only makes sense that your commlink acts as the 'universal remote' for all your home appliances.
Why would the lamp have a wireless link? Or, are you talking some sort of wireless lamp that runs on batteries? Because it's a bit redundant for the lamp to be both wired and wireless at the same time. You'd have a wireless link for connectivity and a wire for electricity. Why not just continue the long standing tradition of having the plug-in be both for power and matrix connectivity? I know that wireless is the new thing and all, but the point in wireless is to keep the wires from getting in the way. If the object is stationary, and doesn't need to move, why wouldn't it be wired into a matrix/power connection?
Even if you did find something with a wireless connection, I would rule that you couldn't use it to spoof your way into someone else's cyber. Most wireless devices simply weren't designed for what you are proposing. You would be seriously crippled by the stats of whatever device you attempted to use to hack with.
QUOTE (Hermit)
No, that just means you have to run a little brute force to find the correct ID codes for spoofing them. The bad thing about wireless is that it doesn't transmit point to point. Also, a wireless device cannot tellt he vector an order is coming from, so once you have decrypted the master control codes of that cyberware, you cann give it orders like you would a drone, and it wouldn't know the difference between your and legitimate orders.
I can't help but think of a little helpful 'advice' that I gave to someone a long time ago. If you're going to use physical mask to try to get into a girl's pants by pretending to be her boyfriend... make sure the boyfriend isn't in the room.
If you're going to spoof the commlink, don't you think that the commlink might notice? Here you are having a chat with one of the commlink's 'girlfriends', and she starts talking to your commlink, don't you think that the real 'boyfriend' should be out of the room, so to speak?
Once the cyberware starts listening to someone spoofing your commlink, it should try to confirm what it's doing. It would go something like this:
Spoofer: Sends out spoofed command as your commlink.
Cyberware: Attempts to 'talk back' to your 'commlink', not knowing that it's being spoofed.
Spoofer: Attempts to continue spoofing commands for the cyber.
Your Commlink: Having discovered the cyberware attempting to have a strange conversation about commands not given by your commlink, decides to order the cyberware to switch to a new communications code.
The end result is that every time the spoofer attempts to spoof the commlink, the commlink tells the cyberware to ignore the spoofer, and starts the spoofer back at square one. So, in order to spoof a commlink, you'd have to deal with the commlink before you spoofed the signal.
Here's something that can also be done. Set up your cyberware to have different 'modes'. 'Green' mode would be for safe areas where hacking isn't possible. (Like rooms painted with anti-wireless paint.) This lets your Doc access your cyberware for analysis. 'Yellow' mode would be for walking about around town. Which leads to warnings like: "CONDITION: YELLOW. That function is not accessible while the cyberware is in condition YELLOW." Finally, there would be 'Red' mode, which is combat mode. This means that the security would become even tighter when in combat. The commlink would even ask that all devices in the PAN respond to a different encryption code. (Warning: Switch to code RED, all devices switch to encryption 34A96SWTFZ389.)
I just see it as being very easy to protect cyberware from being hacked. Hopefully, once they release unwired they include more information about how to keep your wireless devices safe. Especially since a lot of people seem to think that it is easy when it shouldn't be.