QUOTE (Jaid @ Jun 12 2009, 05:51 PM)

anyways, this is even worse;
Not really. You simply need to read closer. I have edited my earlier post to highlight some key phrases.
QUOTE (Jaid @ Jun 12 2009, 05:51 PM)

an attempt to hide the datatrail has the threshold increased by 1, and spoofing your AID (or altering it with hardware) is not an extended test.
You forgot to continue down to the part where spoofing the ID takes several
minutes, far to long to be an effective tactic while in mid run.
Altering your Access ID is something done before you begin a run, and requires no Programs to complete. It is either a Hacking+Software or Hardware+Logic test. It takes place entirely within the confines of your own node, so there is no datatrail to worry about creating, at least until you start connecting to other systems. Spoofing your ID is what you do to distance yourself from your last seven Stuffer Shack purchases while on a run, and what you do to clean up
after you've finished a run and don't want to be linked to the hacks you just pulled off, not a method for eluding an
active trace (not an effective method at least).
QUOTE (Jaid @ Jun 12 2009, 05:51 PM)

so in the above (and looking at it, oddly enough registration cannot be applied to system and firewall, technically, so apparently you're right; my personal opinion is that's an oversight, but whatever).
While that may be your opinion, there is nothing to back that up. Characters have Attributes, these are defined as Physical, Mental and Special Attributes. Commlinks/Nodes/Nexi have Attributes. These are defined as Hardware (analagous to Physical) and Software (analagous to Mental) Attributes. One could even say that things like Persona Limits are analagous to Special Attributes.
Software Attributes for nodes are System and Firewall. Software is not the same as Programs.
QUOTE (Jaid @ Jun 12 2009, 05:51 PM)

so, now instead of a threshold 2 test, in the above scenario you're talking about a threshold 5 test. if you should be unfortunate enough to actually have a full suite of programs that are registered, you're looking at a threshold of over 20 on a non-extended test. or, in other words, you're pretty much screwed.
Actually no, you have a threshold of 2, because you are smart and did it before the run, and needed no Programs to complete the task, therefore bypassing any use of Registration. Of course if you are really smart, you've instead done one hardware test in the past and installed a Spoof Chip, at which point you can change the ID at the push of a button (which drops all subscriptions and likely still takes "minutes" to register properly, but is so simple a toddler could do it).
And really, "threshold of 20"? At best, barring a milspec commlink of some rarity, the average hacker could only conceivably be running 11 programs at once (or is only
likely to be, not wanting to suffer Response degradation), assuming 6 of them are Ergonomic.
Also, only the programs you have
actively running will be generating a datatrail and therefore contributing to the negative effects of Registration. If you've got a Registered copy of Miracle Shooter or even Decrypt sitting in your commlink's memory but it is not being used, it's not going to add penalties.
One thing the user of registered programs
does have to be cautious of is constantly swapping programs. If it's been used to hack the node in question, it
will add penalties even if you unload it.
QUOTE (Jaid @ Jun 12 2009, 05:51 PM)

and an attempt to change your access ID is indeed
an attempt to 'eleminate traces of the data trail':
QUOTE ((SR4A page 224))
The standard technique to reduce your datatrail is to spoof your commlink’s access ID.
(emphasis added)
Emphasis added as well.
Changing your Access ID is indeed an attempt (more precisely a
method) to reduce the datatrail, but it is not the
only method by which such attempts may be made. It is a generally useful method for doing things like avoiding spam, stopping Stuffer Shack from building a profile on you as one of their biggest SoyKaf drinkers at a given location, and generaly sticking to the shadows. For hackers it is very useful in assuring that the job they are currently doing on a given node isn't linked back to the job they did on some other node last week. It is not, due to the time it takes--once again,
minutes are involved here, or 20-30 Combat Rounds, plenty of time for a spider to Trace the
old AID--an effective method for slipping a trace.
The basic methods for reducing the datatrail
while hacking involve Editing the Access Log (specifically mentioned in the rule above, now higlighted in red) and taking Redirect Trace actions while actively being tracked. Both of these are indeed made more difficult when using Registered programs, but can be dealt with to some degree by using only those programs that are necessary. You can also simply delete the access log if you're not worried about security knowing that
someone was here (although they won't know who), all that takes is appropriate level account access. Beating the threshold for the Redirect Trace will still add to the threshold of the Trace User action for the tracking spider, it's just harder to do.
QUOTE (Jaid @ Jun 12 2009, 05:51 PM)

so yeah, using registered programs is pretty much a death sentence.
Is it a good idea for dedicated Hackers to use non-Registered programs? Certianly. They are not nearly the "death sentence" you seem to think they are though.