(crossposted at Shadowrun4 forum)
I'm requesting a rules check as it looks to me as though there's a defense against (some) spoofing.
Put a databomb on the access port.
As I read the rules, to issue a command (with the access ID) the node must be accessed.
Now I'd not put this on devices that have a wide range of interaction. Putting them on the slaved drones and other devices, however, looks to me like a nice way to cover the only weakness of slaved devices -- their vulnerability to spoof attacks.
However, I'm still learning and could be wrong, so I'm asking for a doublecheck. Thanks.