Since I have had a reasonable amount of rest last night, Let me try this Tack...
1. You have a Slaved Node
2. You want to spoof Commnads to that Slaved Node.
3. You do not, yet, have the Access ID of the Master node.
4. You Trace a User on that Node to get Their AID to access the Master Node.
5. Now, you use the Users AID to Spoof a Command to the Master Node.
Now, why do you do that? Notice that the rule does not say that you
Trace the Master Node to get its AID, because that is already assummed. Let me put it back up here again. It says...
QUOTE (Unwired, Page 55)
Slaving
One node, the slave, may be linked to another node, the master. In this setup, the master is given full admin access to the slave.
When slaving a node to a master, the slaved node does not accept any Matrix connections from any other node but the master and instantly forwards any connection attempts to the master.
Hackers have three options when faced with a slaved node. First, they can hack in directly to the slave with an additional
threshold modifer of +2, though this requires a physical (wired) connection to the device. Second, they can hack the master node
(thus gaining access to the slaved node-and any other slaves-as well), though this node is usually more secure. Third, they can
spoof the access ID of the master node and then spoof commands to the slave
So, why are you
Spoofing the AID of the Master Node? I interpret this as a direct, temporary connection through the Master node so that you may communicate with the Slaved Node. Why? Because the Slaved Node will accept
No New Connections from any nodes. Why? Because it already has a Direct Linked Connection, Via the Subscription that is already in place (See Subscription Rules, and implement Slaving Rules). It does not need to accept another connection, and in fact, will not accept any pther connection whatsoever.
6. Ultimately, you want that command to go to the Slave, but the Master Node will not Run that Command on its own, so...
7. Once the Master Node has been Spoofed, you grab the Master's AID and you now Spoof the Slaved Node, using the Master's AID.
8. The Slaved Node does what it has been commanded to do.
It is a completely different interpretation than you use,
Ghost_in_the_System, because it has to be. Otherwise your Slaved Nodes and Your Standard Nodes are treated identically for purposes of Spoof, and that is not the intent, as outlined in the rules above.
Do both systems work? Of Course they do. But by using the exact same system for both types of Nodes, you have just invalidated the Slaving Rules. Why? Because you already
Must have an Appropriate AID for the Node to be Spoofed. The reason a Slaved node is HARDER too Spoof than the Standard Node, is because the Slaved Node
will not accept any other outside communications whatsoever, which is not true for the Standard Node.
Hopefully this is a bit more coherent than my sleep addled ramblings from last night...
Anyways. It really is academic, as
Deek stated, because each table is going to use the rules as they see fit, no matter any other's interpretations.