Ok, there's two tricks I want to try out in upcoming games and I though I'd run them by the Dumpshockers first. One is basically an AR "Invisibility" hack, the other is a defensive attack to screw with technos and hotsiming hackers.
The first trick is pretty simple. Take security guard Bob. Bob is standing at a critical access point that I want to get by. Instead of having the mage cast invisibility, I want to hack into his commlink (shouldn't be too tough) and upload a modified AR software called Reality Filter (AFB). Reality Filter allows you to tune out unpleasant sounds, visuals, and smells. I'm a pretty unpleasant fellow and so I've modified this AR software to consider me and my chummers "unpleasant". Now presuming this guy is using AR (which seems pretty safe) my chummers and I are basically invisible to this slob, right?
If I can get this to work, I'd really like to stick a trojan onto it, then hack into their system and upload it to a nexus as a "standard AR software update". Right setup and you're not only invisible to every slob hooked into their system, you've got a Trojan (like Rat or Vector) to wreck their system whenever you need. Sure, it might be a tough hack, but I can't imagine I'd ever need to hack their system again. Worst case scenario, I Vector in a bunch of Replicating Worms and crash/kill everyone hooked in.
The second one is a take-off on an old trick I saw in a 2nd ed book, I think it was called an Escher Loop. The idea was you access the wrong node/open the wrong file and pretty soon all you see is an Escher painting like the one with the stairs. You're trapped and can't even log off, you just hope one of your chummers comes by and disconnects you before you die of thirst.
My take on this is to use a ring of slaved nodes. It works off this premise. Say I slave node A to node B which is slaved to node C. Anyone trying to access node A gets booted to node C. So in this case I have node A (my hacking commlink) and nodes B-E (metalinks). Node A (my hacking commlink) is slave to node B. Node B, however, is slaved to node C, which is slaved to node D, which is slaved to node E, which is slaved to node B. You've got a complete loop with the actually valuable node hidden outside. Map it out and it looks like a lollipop.
Now someone tries to hack my Commlink (Node A). Because Node A is slaved to node B, they get kicked to node B. However, because node B is slaved to node C, they get kicked to node C, then kicked to node D, then kicked to node E, then kicked back to node B and the whole things starts again.
Presuming that slaving works this way (I'm like 95% confident), the intruder never actually lands in a node, they're constantly being forwarded to a new node. Here's where I'm less sure about what happens. Quite simply, I have no idea if someone can take Matrix actions outside of a node or while they're logging into a new node. If they can, it's just annoying, they logoff and log back on, then DDOS the loop to break it or something. If you cannot, however, then it gets fun. Someone hacking by AR is probably going to be frustrated for a bit, then manually reboot their commlink and try again. Hotsiming hackers are stuck though, they can't take non-Matrix actions (ok, technically they can at like -*8*) and the loop prevents them from taking Matrix actions, meaning they're trapped until either their chummers unhook them or they manage by sheer willpower (at -*8*) to rip their rig off. Technos are even worse off, as far as I know one of their chummers has to find him, figure out what's going on, then knock him out to disconnect him, then suffer dumpshock.
I'd appreciate any advice on these, especially if I messed something up and how I can fix it.