QUOTE
One node, the slave, may be linked to another node, the master.
In this setup, the master is given full admin access to the slave.
When slaving a node to a master, the slaved node does not accept
any Matrix connections from any other node but the master and
instantly forwards any connection attempts to the master.
Hackers have three options when faced with a slaved node.
First, they can hack in directly to the slave with an additional
threshold modifier of +2, though this requires a physical (wired)
connection to the device. Second, they can hack the master node
(thus gaining access to the slaved node—and any other slaves—
as well), though this node is usually more secure. Third, they can
spoof the access ID of the master node and then spoof commands
to the slave.
So, option 1 basically isn't going to work, because if your commlink has a physical wired connection with the hacker, you've got bigger problems.
Option 2 doesn't work because the 'master node' in this case is physical input or your brain, neither of which can be hacked.
Option 3 doesn't work either because you can't spoof a physical command or a brain. And it should be noted that the rules for spoofing require that you have 'seen' the master system (And even know what it is in the first place). So yeah, a commlink slaved to your brain or physical input is basically impossible to hack. Something slaved to that commlink though, that could be hacked by virtue of spoofing the commlink, but you still need to figure out which commlink it is slaved to and then go find it. Oh, and don't forget that those subsystems only have a signal of 0 generally, and the commlink won't cooperate in bouncing a signal to them, so you'd need to be within a few meters of the hacking target to manage this.