QUOTE (Ranger @ Mar 16 2008, 12:49 PM)

My question regarding communicating with the skinlink was more in regard to if you wanted to have a phone call to a buddy, and neither of you are in the Matrix. Just a regular phone call. Unless I misread what you wrote, I think you are thinking in terms of communication within the Matrix. So, outside the Matrix, would you be able to hold a phone conversation using a skinlink attached to your commlink?
Yeah, you're right, I was thinking within the confines of the Matrix. Outside of the matrix, a skin-link would let you talk directly to your comlink to make it dial up someone or whatever. I'm not certain it'd allow thought communications though, because you're linking to the interface and it's controls, rather than the actual vocal sections. That's my take on it. Internal phones/comlinks wouldn't have that restriction, as they're designed to be completely beyond external influence for the purpose of the conversation. Again, that's just my take on it. You could theoretically mod the comlink or introduce a transducer for a person who wants a simple skinlink to allow for thought-talk communications... This is one of those things that's kinda hard to wrap my head around, and thusly articulate.
QUOTE (Ranger @ Mar 16 2008, 12:49 PM)

So, to do the reverse (stop the hackker from communicating to people outside the Matrix), it seems that there would have to be another hacker, an agent, or IC trying to stop the communications.
The way I envision it is this: On a network right now IRL, I can assign permissions to each client on the network. I can keep them from seeing certain things, or give them access to specific stuff or whatever. I figure a hacker/TM in charge of a network could do the same for his team. If he wants X dudar muted or to have no incoming audio, he just disables that portion of the feed to that link, and whammo, he's done. If you wanted to prevent someone else from talking, at that point you're looking at a contested hack of some sort. Bad_guy01 trying to stop Hacker from communicating, and Hacker trying to keep the connection open long enough to get his info out. Kinda like the attack on Shadowland in the Renraku Arcology book. So yeah, another hacker or agent or IC could try to sever/isolate/lock down that connection if it wanted to. (That was a bit rambly, let me know if I wasn't clear)