Re: maglocks, the errata suggests: "Hacking your way past one is probably the number one use of direct connection and using Spoof Command."
But, since Spoof command can be performed with Outsider access, why would one need the direct connection? Couldn't one just spot the "running silently" device via a Matrix Perception test and then Spoof it without the direct connection?
It depends on whether the maglock is meant to interact with people who are not logged in to the host.
Consider a maglock on the main entrance of the office building vs a maglock protecting an office inside a tenant corp facility on the 4th floor of that same office building.
<snip>
I understand your logic but respectfully suggest that interpretation is not consistent with the ground rules established earlier in the section describing what actions may be performed as an outsider.
From Banshee's guide we have ...
"Interaction - what does this include? In this case that means the only matrix action that you can directly take against any “inside” devices/icons is limited to Matrix Perception while being on the outside. All inside devices are considered to be running silent using the Host Rating+Sleaze of the Host as the opposed dice roll. To target any icon (persona, device, IC, nested sub-host, etc)
on the inside you must first gain access via Brute Force, Backdoor Entry, or Direct Connection."
Earlier (page 1) of this thread I questioned the above "interaction" section and came away with the understanding that one *can* attempt to brick a device (aka Data Spike) because the Data Spike action is an Outsider action. I was told that those limitations were for actions taken "inside" the host. So, with respect to bricking someone's gun (a device "beyond the event horizon"), it is treated as an silent device which I can perceive and target even as an Outsider with a Matrix Perception test.
I suggest that the maglock is no different mechanically from the gun. It is simply a "device" on a "network" which I can perceive and take "outsider" actions against (and Spoof is an outsider action). My conclusion is that performing a Spoof against a maglock is mechanically no different from performing a Data Spike against a gun.