more specifically it would be the access point of the host .... Physical distance between the two personas don't mean anything since they are both occupying the host at that time it would be distance between each of them and the host.
Oh... This is interesting.
So would you say that the physical distance could be measured between the attacker and the physically closest point of the network?
For example if a host is physically located in Berlin, but one of the devices that is part of the network happen to be a vending machine in downtown Seattle. Would a hacker located in Seattle that wish to probe the network measure the distance from his cyberdeck and the vending machine in downtown Seattle...?
Actually it's even more simple than that really ... if you can "see" thecicon for the device you can hack it.
But that's the thing. It is not clear what the intention is here. What are we supposed to see and what are we not supposed to see. When is the Enter Host action required and when is it enough to 'just' have user or admin access on the network....?
I am assuming that I can 'see' a specific wireless device that have a matrix connection (for example a traffic camera overlooking in the corner of Zimmerstrasse and Wilhelmstrasse in central Berlin - even if I am currently physically in Seattle) and no matter if it is part of a mobile personal network, part of a stationary wide area network or not part of a network at all (in the sense that I can target it with Data Spike or Spoof Command).
I am also assuming that I don't need to take a test to 'see' a specific device, unless the network it is part of is running silent (in which case it seem to be resolved as a matrix perception test opposed by the network's sleaze rating plus willpower rating of the owner if PAN or whoever, if any, is currently monitoring if host network... where I need at least a tie - in which case I will 'see' the entire network including all the 'nodes' or 'devices' or 'access points' being part of the network).
But I am also also assuming that I cannot 'see' a specific file stored inside a host (in the sense that I can't hash check it, disarm its data bomb, crack its protection nor copy it) unless i first gain at least user access on the network
and that I
also (in
addition) spend the required minor action in order to actually enter the host.