
1. In regards the the Blackout\Blackhammer program, it claims in the program description to only work on VR users. He proposed that it seems like it may also work on an AR user operating through DNI input (trodes, datajack, implanted 'link). I suggested that it may be that in AR the simsense levels are toned down enough (in that they don't totally override your senses) that any spikes caused by the program would at most cause a painful headache for that combat turn.
Has anyone else done this at their table? I'm thinking that a -1 or so dice pool modifier for the turn that the program was used could be appropriate in that, admittedly very specific situation.
2. For the Spoof Command action to work, you need the access ID of an authorized user. It seems, from the fiction at least, you can use what I'm assuming is the Capture Wireless Signal action with the Sniffer program on the device, and then use a Trace User action to get the commanding node's access ID. Is this correct? Does the captured traffic give you enough of the users information to run a trace?
3. Somewhat related to the above, will the Capture Wireless Signal action work on a device if it and the user are not in direct signal range of each other? I would assume so, in that even if the information being sent is split up and routed, it departs the node intact. I would also assume you could follow one of those pieces of the original info back to the recipient using the Track program, but may not be able to record a coherent message if they do depart sliced up.
Or am I wrong and all three devices (The Hackers commlink, the device to be spoofed, and the commanding node) all need to be in mutual signal range of one another for this to work?
4. Related to question 3. For the Intercept Traffic action, it mentions that for it to be effective you have to have access to a node that all the traffic passes through. Would this include the originating and receiving node? And if you where attempting to block or alter the traffic using the Edit action on one of those nodes, would it happen too quickly to make any meaningful changes? (For example, a hacker in the node of the recipient would hear the traffic at the same time as each other).
5. We couldn't come up with a very good reason for implants that are primarily controlled by wired DNI to accept incoming wireless commands outside of repair\medical situations. Is it possible to arrange a device like a cyberarm to only broadcast info (serial numbers, medical info) but not accept any kind of commands from a non-wired DNI source unless a physical switch is activated? I'd assume that only people who are aware of this vulnerability would think about it (Professional rating 3 or above).
6. Related to question 5 (Funny how questions lead to more questions). I'm trying to think of a good way to describe this without resorting to diagrams...

Say a hacker using a commlink with DNI hacks into a victims commlink also controlled by DNI (lets say by trodes) who also happens to have a cyberarm controlled by wired DNI.
Could the hacker, using his sim-module to translate his own arm movements into machine code, use his access to the victims commlink + sim-module to translate it back into DNI commands to the trodes, into the victims brain and from there to the wired connection into the cyberarm.
I think this may work in that a sim-module translates information from the matrix into something you can see, feel or hear with your brain so it make sense that the arm could be manipulated by these very signals.
Phew, this ran on a bit longer than I planned. Thanks in advance for your opinions!