This situation came down in a game I had today. My hacker isolated opponents Bit through enemy repeater. Isolated hackers cannot use hacking device and programs, but is still a hacker. So at this point can I still declare further hacking attacs (carbonite to almost completly brick that Bit)? If I choose not to do this and instead just walk through repeater does my opponent get to reset becouse hackable target moved inside hacking area or does isolated prevent this and she gets to reset only if I try to hack? And how does this interaction change if its my repeater that allowed hacking?
even if the hacking device is broken, the model is still classified as a hacker. so yes, the various hacking attacks work against them and they also are still a specialist. the 2nd part i am not 100% on but i do believe you are allowed to declare reset as an aro for an active model walking through a repeater and because of that walking near a repeater can cause an enemy model to get out of isolation.
Yes, they're allowed to declare Reset for the same reason that you're able to hack them while they're Isolate; they're still hackers which is the criteria to declare Hacking AROs through Repeaters and Reset is a Hacking ARO.
Ok so another basic hacking question that i sort of know the answer but it's better to be sure. What if unhackable (Li,Mi) unit walks through enemy repeater, do hackers without spotlight get valid aro?
Yup. Same as above ;) Plus, theoretically those units could be Holomasked heavy infantry, you never know until you try...
What Mahtamori said. Remember that Hacking Area AROs have no requirement that the Active Trooper be hackable, just that they're acting in your Hacking Area (and not using Stealth, obviously).
Not sure if I'm right, but there is the Hacker Skill and the Equipment Hacking Device. As far as I read, the Hacking Device gives the Hacker the opportunity to act (Perform Programs) in their Hacking Area, not the Hacker Skill. The Hacking Device is disabled and would prevent the Hacker from getting an ARO by another model passing one of his Repeaters (he dosen't have a hacking area either?). He could still reset if a unit passes his ZoC or he is hacked again, because then he has a valid ARO. So declaring Reset is relevant, but might not executed? The Hacking programs just require a valid target, which is a unit with the Hacker Skill. So he can become hacked again. Game wise this makes sense to me. The Hacker is locked in his environment (he dosen't have the password anymore), but that dosen't mean, other units cant attack his communication again. Which e would then notice and geth the opportunity to reset.
What tox said. The Hacking Area is linked to being 'a Hacker', not to having a Hacking Device. Bear in mind that the Hacker Skill allows the use of Hacking Programs all by itself in N4, and there are several hackers who just have a list of Programs with no Hacking Device at all. Hacking Devices just give you a preset list of Programs.
Ok, great, didn't had that on my screen. Does this mean, these hacking programs are still usable while isolated, but not those related to the Hacking Devices?
This is the relevant bit of the hacker Skill (bold added): Hackers may be equipped with a Hacking Device that will grant them access to certain Hacking Programs, depending on the type of Device they are using, or to make direct use of certain Programs without requiring a device. Isolated Hackers can't use Hacking Programs at all. From the FAQ: Q: How does Isolated State interact with Hacking Programs that are not granted by a Hacking Device? A: While in Isolated State all the Trooper’s Hacking Programs, Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled.
Just to put it out there: You can also finish off Unconsious Hackers with KHDs or hack them further with HD Programs. That didn't work in N3 afaik.
Good explanation, thanks guys. This kind of complicated interaction might bear a quick explanation in a FAQ. Especially the bit about still having access to Hacking Area AROs even when the hacker is Isolated: that is pretty counter-intuitive for a newbie.