In regards to slaving.... I'm actually thinking it does something like the opposite. It states that it forwards all connection attempts to the master. I'm sort of thinking in this situation that if anything, the trace would be rerouted directly to the hacker.
Are you referring to a public matrix? Because I am not. Regarding the automatic routing through all and any, is that the devices aren't necessarily set as fully available. Use a layered approach, and that each node will require it's own authentication method. We're not talking public matrix here that allows you to directly route public access across, but a private network. I see the matrix like a chain of public access servers like modern day servers and the internet backbone. However this doesn't mean I have any access to a private home network, or each workstation on that network.
Single user, or admin/security users. And the other nodes are (at first) out of the range of the defender, only the end of the chain is in range. Let us also state that in the original example, none of the other chains of drones are broadcasting a signal but are all laser linked. Once you break into one, you can find the signal of the other, but even with the Access ID it's not going to let you subscribe and the previous authentication/password is different.
Building corp security for example, the primary security node shouldn't be so easily traced and without public access to ping the next server in line or down the line, how can you tell the location?
p73 of unwired:
Layered Access
A spider can use an “onionskin” approach to security. In this
method, the network is configured to have multiple gateways, each
leading to the next. Unless the attacker can access the target node
directly, she will be forced to work her way into a desired target
one node at a time, slowing the attack and giving the system a
chance to defend itself.
Would track work over a system like this?