QUOTE (Mayhem_2006 @ Jun 11 2011, 05:12 AM)

It always struck me that an emotitoy surely wouldn't be that secure from hacking, so if a runner team want to show up at a meet with one, let them.
Unwired 55
QUOTE
Hackers have three options when faced with a slaved node. First, they can hack in directly to the slave with an additional threshold modifier of +2, though this requires a physical (wired) connection to the device. Second, they can hack the master node (thus gaining access to the slaved node—and any other slaves— as well), though this node is usually more secure. Third, they can spoof the access ID of the master node and then spoof commands
to the slave.
Note that option 3 means (if I recall) taking 6 dice off the spoof role because of the whole admin thing (recently beaten to death on Dumpshock),