1. Can hosts contain devices that are not slaved to them as a WAN?
I don't think so.
Correct. Devices that are connected to a host are part of the host's WAN. A device can still send a signal to a host, and vice versa though. The advantage to putting a device outside the WAN is that physically tampering with the device doesn't automatically grant access to the host. The disadvantage is that the device has to communicate via sending messages, rather than just pouring data into the host. Whether this has an appreciable effect on the device, a security decker, or what have you is contested. I wasn't going to talk about this, but I have submitted some ideas for security riggers. If my ideas are approved, having a device that isn't slaved to a host will have much more noticeable effect.
2. If you mark a host (or any master), do you mark all of its slaved devices?
I think no?
Correct. Marking the slave will mark the master, but marking the master does not mark the slave.
3. If you add a mark to a device in the host, does that add a mark to the host?
Amazingly, yes, I think so.
Yup. See above.
4. If you have two marks on the host and zero marks on a device, and you add a mark to a device, do you now have three marks on the host?
A more specific version of #3, but I think yes?
Questionable. My answer would be no, but that's because I see marks as being done in levels. So if you have level 2 marks on a host, and get a level 1 mark on a device, you still only have level 2 on the host. If you have level 2 on the host, but get level 3 on a slaved device, then you get level 3 on the host as well. Honestly, there's no basis for this opinion, it's just how I perceive security working in a situation like this. Hopefully
Data Trails will provide some clarity.
5. If I direct connection to a WAN slaved device, am I "in" the host? i.e. can I see other icons in the host and interact with them?
I think yes?
Yes. The way this works is to have you connected to your cyberdeck, then you connect to the device. The cyberdeck generates the persona, which then enters the host via the device's access point.
6. Once I direct connect to a device, can I jump from there to a grid?
This is super confusing. Since exiting a host puts you on the grid you came from and there WAS no starting grid, I'm going to say no.
Only if that device is capable of forming a persona (commlink, cyberdeck, rigger command console), or if you're already on a grid. Otherwise, you'd just get dumped into the meat world again.
7. If you are someplace with literally no Matrix access (e.g. a Faraday cage) and you direct connect to a device... does that work? Can you still interact with it via Matrix actions? (since the rules explicitly say you need to have a grid to use the Matrix)
I have no idea.
I would say yes, but your access is limited to only within the Faraday cage.
Thoughts? These rules accumulated honestly make the system seem pretty broken, since targeting any device in the host marks all the other devices and the host itself. That strikes me as strange.
The intent with this seems to have been to provide a physical method of hacking into a host that has really high stats. It encourages a hacker to get on-site and plug in directly to the terminal, camera, or whatnot. Which is how hacking always had to be done from 1st edition to 3rd edition. 4th edition's hacking was broken in that a kid in Germany with a commlink could hack a Renraku Ultraviolet node in Tokyo without breaking a sweat. I think 5th edition's hacking rules are trying to be somewhere in the middle, and I still hold out hope that
Data Trails will give us many more options and much more clarity.