Need help countering a tactic someone came up with on Dumpshock. "I'm a street samurai. I want to protect my cyberware and guns from hackers. I'm making all my gear run silent and I'm stashing 50 RFID tags also all running silent. That means a hacker has a 1/6 chance of finding any of my 10 pieces of gear to hack when wasting a Complex Action to find icons running silent!" This seems as cheesy to me as a Velveeta factory, but I can't seem to find any rules that counter the tactic. Got anything?
Just slap a mark on whatever icon you happen to find. P. 233: "Because of the tight connections between the devices, if you get a mark on a slave you also get a mark on the master." Start marking up whatever slaved device you find, thereby giving you marks on the master, then mess up that bad boy. You don't have to find the right icon--you just have to find one of them.
Jason H.