Tymeaus:QUOTE (Tymeaus Jalynsfein @ Mar 28 2010, 08:01 PM)

Secondly: Each node can have a number of Subscriptions equal to twice their System... so Node A is subscribed to Node B (as are several Other Nodes A1-whatever)... Nodeb has a single subscription BACK to Node C (as do Several Other Nodes B1-whatever)... I have never stated that Node C directly subscribed to Node A as that would circumvent an important security protocol (that of a layered System, which is described in Unwired and is the "Missing Information" that you are apparently not noticing... It is a Canon reference to a style of System Security, Which I use religiously, as a Character, even on my own PAN .). Since you can have incremented subscruiptions, this creates a "Chain" of Nodes That MUST be hacked in sequence in order to progress... Since you cannot wirelessly just move to Node C, you must move through the Hardwired security setup... This creates a wonderful chokepoint system that the Hacker must maneuver through if he wants to do anything...
Thirdly: The Trace USER Matrix Action allows you to determine what node originates the Program, and what the User Access ID is... You cannot trace Hardware (as a Camera is)... therefore you cannot just bypass the security measures that are in place... According to the Rules... Page 232 of SR4A... You can only trace ICONS... a Piece of Hardware is not an ICON... In my exapmle... the Camera is running its own security programs (it can do so because it is a Node), thus, you cannot trace a program back any further than the Camera, which is where you are starting the hack at... so in this regard, Trace is entirely useless... as for the next node in the line... you cannot trace it, because you have no access to it, that is what the Exploit Program and Hacking is for... you have to crack the new node... pretty simple..
As for tracking the Other end of the Subscription, it only provides the location and User Access ID... except that the Node has NO User ID... it is a NODE, not an ICON... so again, The Trace User Matrix Action is pretty useless against Hardware...
Even the Log On Matrix Action would REQUIRE you to deal with the requisite security procedures, as indicated in the Action described on Page 231. and you can really only Log On to a system to which you have Access, otherwise you would have to hack it...
Now, let us look at the actual program...
It is used to analyze a user's connection and follow the datatrail back to the originating Node... What allows the program to work is that is is using the mesh web to follow the signal... and this is a very important piece of information... it never accesses another node, as it is using the communications path that is created using the mesh... as a user, you do not connect to every node that you pass through, the signal is just bounced from device to device... you have never entered the Node you are using to bounce... On a Secured system, this is not the case... you MUST pass through each and every node that is along the path, and deal with each and every node's security (assumming that you are not using a legitimate account, which bypasses this with the account's permissions). At that point, If a trace User Action enters a Node, it must do so with an exploit... if the Traking Icon (It is an IC/Agent or User right?) does not have an Exploit program available, the Trace User Matrix Action stops right there... Ironically, many people use Proxy Servers for just this very purpose, though a Node does not have to be a Proxy server to stop the Trace (IE... Proxy Servers have additional Game Mechanics)... once you have traced to a node which requires hacking (assuming that the Trace cannot Exploit its way pas the Node Gateway), that is the access point that is reported back to the User/IC/Agent that initiated the Trace.
Now, all that being said... You are correct that if you were able to obtain the Spider's Hardware (his Comlink or Data Terminal), then you would have little reason to Hack, as his system interfaces the system with no trouble... however, you may still need to Hack if you ever try to go somewhere he was not allowed to go... not all Security Spiders have access to all parts of the System after all...
Security in Depth is going to be the watchword for any Megacorporate entity... whether they are Clas A, AA, or AAA.... Ignoring that partcular paradigm will cause potentially grave exposure to their system, and that is not going to be allowed... That being said, some systems will be more secure than other systems... You may only have a layer or two on a minimal system that is intended for public consumption... however, the ultra-secure Zero AOne Research Facility, buried underground, and protected by Systems that dispense Nerve agent at teh first sign of penetration, and have absolutely no external connection to the Matrix... well these are going to contain as many layers as they think is necessary to keep out the riff-raff, and yet still allow those researchers to do their job... obviously, the first layer of defense is that you will have to crash their party just to have a chance at their network... it only gets harder from there though...
I do Understand now where you come from (for the most part), but am unsure why you still deny the use of Layered defenses on a System, since it talks about such things in the Unwired Core Matrix Rulebook (Please see the Section titled "System Topology, and System Design" pages 72-76). this should clear up a few points I would imagine... Also, there are several exapmles of Tiered Systems, as kjones has pointed out, on Page 77-78 of the Book...
Hope I am not comming off as an Ass or something... I am genuinly confounded by some of your stance is all...
Let's ramble on at you a little.
You put far too much stock in the names given to the actions you can take. I don't care if an action I take is called "Rape Small Children" if what it
does is trace a subscription back to its originating node - which is what the "Trace USER" (your emphasis) action does.
QUOTE (Page 232 @ BBB)
Trace User (Track)
You trace an icon back to its originating node.
Oh, and having a subscription puts your Persona into the node you subscribed to, as you can't acquire a subscription without taking the Log On action.
QUOTE (Page 231 @ BBB)
Log On (System)
You open a subscription to a node, and your icon appears there.
I can find no other way to acquire a Subscription to a node. Tell me if I am wrong.
It's never outright stated (at least any more), but it is implied in the RAW that you need to have a Subscription to use a sensor.
QUOTE (Page 246 @ BBB)
In many buildings, all security devices are subscribed to a central node on which a spider can jump into the entire security system.
One can also argue that proactively perceiving your environment using a Sensor is basically commanding a device, and would require a Subscription. The point is that without subscribing to the Cameras from the security node(s) there is no way for their information to be used except for ad-hoc subscriptions from the guards on the ground. They pose no threat without being subscribed.
In a secure network
nothing. You have yet to explain a way to set up a Daisy Chain that does not fail, or does not involve negating any benefits you can draw from the network in the first place.
I'm not saying that you can't layer defenses, but the idea that you can increase how arduous a Matrix intrusion is by merely throwing money at the problem is basically bad for the game. The Matrix needs to be designed so as to present a level playing field between the PC Hacker and the Corp, and it is (for the most part, leaving aside Agent Smith fiascoes). The fact that having more nodes does not make it more difficult to hack you is a positive feature of the rules. Information control must be the primary means of securing a Matrix node, because that is the only way to justify any major Corp being dominated by a small group of elites.
KnightIII:QUOTE (KnightIII @ Mar 28 2010, 06:30 PM)

SR4 Corebook, p 223, black side box entitled Network Security
(I dont have a .pdf of the Core, so I am handtyping from the hardcopy. Forgive typos)
"Though wireless networks are easier, they are also a security vulnerbility. While its true most megacorps prefer to avoid cable spaghetti, they do use "cold storage" wired systems in order to isolate them from outside wireless networks and intrusion. In order to access such networks, a hacker needs to gain access to a physucal jackpoint or terminal. <snip>
Not all networks are configured as mesh networks- many corporate systems, in fact, retain a traditional tiered network structure. In a tiered structure, some systems can only be accessed through another system first, with the most secure systems hiding behind several layers of security.<snip>"
You'd really hate the stuff that followed.... vanishing, teleporting, secret trap-door, one way access nodes... its almost like a... a... matrix dungeon. *shiver*
Not in my book. Page 223 has a big illustration at the bottom of the page and the Device Modes, Persona Programs, and Access IDs headings. The sidebar you quote is nowhere to be found when I looked through the rest of that chapter, either.
Are you using a previous printing or something?
Sithney:QUOTE (Saint Sithney @ Mar 29 2010, 10:37 AM)

It's just a security layer. Sure, hacking through three firewalls isn't as exciting as gunning down three sec guards (although the situation is analogous,) but sometimes it's not about that.
Shooting security guards is an opposed test. Hacking a firewall is an extended test. These things are not the same. Not even analogous, really. One has a set of different actions you can choose between at each step ("now I throw a grenade because I like the explosion noises the GM makes"), the other does not. ("Okay, we've rolled N times, SO NOW IT'S TIME FOR ANOTHER ROLL, GUYZ!")
kjones:QUOTE (kjones @ Mar 28 2010, 06:45 PM)

I just pointed you to information that suggests that your conclusion is wrong! See the example setups on p. 77 of Unwired - these have a tiered security model.
Once you know about Node N, you can go straight to it. That's not a Daisy Chain since you are not
mandated to pass through each previous node in the chain before you can access any given Node. That's what the Log On action says, and the information on Chokepoints doesn't actually contain any references to rules concepts at all. The idea of a Gateway is founded firmly on the idea of Matrix Dungeon Crawl, but MDG is not possible in SR4 because there are no limits (that cannot be bypassed) to what you can use as a target for the Log On action based on where you are.