If that is true, then the benefit of having more marks on a host is that you will have those marks on the IC that spawn. I forget which matrix action it is, but one of the attacks does more damage if you have marks on the target.
*shrug* I suppose you could read it that IC spawns 'clean' with no marks, regardless of how many you have on the Host. It honestly never occurred to me to look at it that way.. it's obviously beneficial for the player to say IC=Host for marking purposes, but also as the GM I don't see it as really breaking things if IC spawns with marks already there. So what if you kill it? It'll just be back next turn anyway. You're inevitably going to lose... you have to just finish up what you're doing and GTFO once IC has been launched.
Another thought with regards to hacking devices downstream for the express purpose of marking the host itself while using lower DR values than the Host's own Rating:
A throwaway line in the fluff caught my attention.
When you’re outside of a host, you can’t interact
directly with icons inside it, although you can still
send messages, make commcalls, and that sort of thing.
Once you’re inside, you can see and interact with icons
inside the host, but not outside (with the same caveat for
messages, calls, etc.).
I'll admit I'm looking for a reason to close a loophole I don't like, but still despite that skin being in the fight I think this line of thought could have merit:
While you're inside the Host, you can't see icons outside the Host. So it comes down to whether the icon for the slaved devices is outside or inside the Host. And they have to be outside the Host because we already know you can mark devices slaved to a Host without first hacking the Host.
So since they're outside the Host.. while you're inside the Host you can't even target its slaved devices with the Brute Force/Hack on the Fly Matrix Action. The quote allows "some" matrix actions across the Host's 'threshold', with the implicit example of the Send Message Matrix Action. I'm not convinced that Brute Force/Hack on the Fly fall into that same bucket.
Any holes in that logic?
Edit: To clarify: In order to hack a device downstream to get the mark on the host upstream, from inside that host for the purposes of just avoiding the host's rating... I'm saying it really looks like you have to rule Brute Force/Hack on the Fly is the same "sort of thing" as sending "a message or commcall". That's in my opinion an unsound leap to make. And I'm saying because of this, at the very least it's an inherently judgemental call subject to table variation as to whether you're able to mark a slaved device from inside the Host.
Edit Edit: On thinking about the implications, I'm even more convinced I'm reading it right. Because if you can mark a slaved device from inside that same host, you have to also be allowed to snipe marks at spiders/IC from outside the host... and if you can do so much as put marks on things across the Host's 'threshold', why can't you just edit files inside the Host from outside the Host?