QUOTE (Warlordtheft @ Jul 1 2009, 03:56 PM)

#1: Based on Pynk's response, dont worry about it unless the number of dice is less than 4 (which any low level hacker or commlink is capable of). Remember that with 4 dice, you can trade that for 1 automatic success.
Hmm.. although in the case of hidden doors (nodes running Stealth) it's an opposed test against the node's Firewall + Stealth, right? As a GM I might shoot the odds a little more closely and estimate 1 success per 3 dice to oppose a PC's perception test -- or maybe make one roll for all the Stealth 3 devices if they're all probably rating 3-4 (and therefore Firewall 3-4), another one for the Stealth 5 nodes, etc.
So unless the Stealth program rating happens to be lower than the device (System) rating, we can assume the Stealth prog will be run at the System rating, and the rule is therefore: stealth dice=device rating x2.
Do things "subscribed" to my commlink, like smartlinked guns and drones, present obvious pathways that show up automatically if those devices aren't running Stealth? Would such obvious pathways exist to other commlinks I happen to be logged into, like say those of my teammates? Especially since those commlinks can't be running Stealth (and therefore, if I read the rules correctly, necessarily be in hidden mode) or else their users will appear suspicious in a public place. I guess that's why every runner needs a "front" commlink to avert suspicion and a "real" commlink to talk to smartguns, etc.
QUOTE (Warlordtheft @ Jul 1 2009, 03:56 PM)

#3. IMHO-Any time there is a hacker vs hacker situation like this, I would assume that the defending Persona would scan each combat round or each time an intruding hacker interacts with the systems.
Yeah, that seems reasonable. I guess there's no canonical answer to, "Does the guard.." (who might be a PC hacker, remember) "..have a chance to detect the hacker trying to get in?" But we know I can have my commlink run Analyze on its own, using my Computer skill rating, to detect people who have already made it in. If it can also detect hackers knocking on the door (i.e. hacking on the fly) it seems like having Analyze help detect them would be standard practice and would therefore be mentioned in the Hacking on the Fly section. But maybe not, since the guarding persona would have to be logged into that node and there's a limit on how many such nodes he can be logged into at once -- so maybe the assumption was that it's usually only the node's firewall trying to detect the attempt. It just seems like it would bear mentioning that any Johnson whose comm you might try to hack will almost certainly be logged into his own node and in possession of a copy of the common-use Analyze prog, and be scanning for such things -- giving him another roll to catch incoming hackers. Or is that considered to be an unusually savvy maneuver for some reason?
Anyway, thanks much for the help, guys.