How can a character protect his cyberware from hacking?
1.) Turn off or remove any wireless links (not always an option). 2.) Use a direct physical connection rather than wireless (externally-accessible implants only). 3.) Keep the Signal low so a hacker would have to be within close range. 4.) Use a good Firewall program. 5.) Use a good Encryption program. 6.) Stay in hidden mode. What does subscribing/slaving a device mean, in terms of access/hacking? If a device is subscribed to someone else’s commlink, can you hack/spoof that device directly, or do you need to hack the commlink first? If a group of devices were subscribed in a daisy-chain together, could you hack the last device directly, or would you need to hack them all in successive order? The act of subscribing is merely the act of creating and maintaining a connection between two nodes. Subscribing does not automatically grant access to a node (unless it happens to be a public all-access node) — that is the purview of accounts. Subscribing is essentially the “handshake” that occu