Talk:When inside a host, are ICs spotted and identified?/@comment-25776910-20160216205302

Notes on the GMing the Matrix by 206.172.0.206

It is important to remember that host do not exist solely as a target for hackers: they are also used by legitimate users. Legitimate users can accidentally trip security (forget passcodes, access the wrong file, etc.) The system should notify the user of the unauthorized access rather then silently spawning killer ICs that will brick his (probably company-supplied) terminal. A couple of ICs (non-damaging) suddenly focusing their attention on the clumsy user is a very effective notification.

Also, running silent incurs a penalty on all actions by these ICs and makes them noticeably less effective. One would think that the priority is to stop and intruder, not give him more time to access your data because your ICs are hampered.

On the other hand, there is definite potential for special hosts who are designed to trap and/or trace hackers. These hosts might have a reason to use silent-running ICs.