This thread is slightly older, but it is the first relevant thread to pop up on “Infinity RPG repeaters” search, so should still be relevant.
Repeaters and Access Points are being conflated here, but they are not (always) the same thing. A Repeater lets you hack as if you were in the Repeater’s zone, an Access Point is your starting point for a deep hack. You are always aware of your Repeaters and their location. You may have to do a scan to find an access point within your Repeater’s range, however, but you’d be at a Close range towards it. There is never a roll to find one of your own repeaters, you’re always aware of it.
So let’s say you’re trying to get into a database to steal some data. You figured out the database is connected to the office terminals through a secured line. You ask your Infiltrator to drop the Repeater in that office room, making you able to hack as if you were in that office room (no matter if you’re half a city away). Then you hack into the office terminals (which likely require a password, after all), and that becomes your Access point. From there you move through the secured link to the database, hack yourself access there, get the info and get out.
If you Mark a comlink and make it a Repeater, then you count as being in the same zone, and you can make it into an Access Point because it is connected to the network, but it is an access point because it is connected to a network and you have access to it. It is not an Access Point because it is your Repeater.
The Remote Access Point table is not a difficulty modifier table. You can only hack in the zone you are in, so you never get distance increases to hacking. That table shows how many zones should be between your access point and your goal if the GM wants to/needs to improvise a hacking scene. You can make a D(0) Analysis test to decrease the number of zones you need to hack through with momentum, symbolizing you discovering more efficient routes to the functions you need. But it has nothing to do with distance modifiers.
So it goes like this:
1: Get into Close range of a viable Access Point either physically, or through getting a Repeater into the same zone. Either way, you need to be at Close range to it.
1a: Hack access to this access point if it is secured.
2: GM determines the amount of zones between you and your target. Amount of zones = Security Rating + Remote Access Point modifier based upon the distance between your Access Point and the Target (so it pays to be closer). Let’s say the Security Rating is 3, and my target (the database) is in the same building. That makes it 3 - 1 = 2 zones between me and the database. I could roll a D0 Analysis check here to try and reduce this number of zones (down to 0 if I roll well, which would mean I can jump straight to step #5) but I won’t for this example.
3: Move to the next Quantronic Zone. If there’s security, hack it first. You are at Close range to the next Zone since you’re treated as being “in” your current Quatronic zone. Your physical position does not matter. If there’s ICE, hostile hackers or Security Geists, deal with them before moving on to the next step (or deal with them).
4: Repeat #3 for however many zones you need to cross. 2 in this case.
5: You have arrived in the zone that contains the database. You can now Hack yourself Super-user access to get permission to see/download the data. You are in its Quantronic zone, so no distance modifier!
6: Mission successful, time to jack out.
- There are no distance modifiers to Hacking. You are either at Close range and able to hack it, or you can’t hack it and need to get closer to it. Which you can do by moving there physically, getting a Repeater there, or starting at a closer Access point and moving through Quantronic zones until you get there. But it needs to be linked up to the same network as something you do have physical or Repeater access to for that.
- In deep-hacking (so outside of AR) your zone is your Quatronic zone, not your physical location! Access point physical location only matters for determining how many quatronic zones you have to cross, not for distance modifiers.
- Repeaters can help you gain access to Access Points, and a Marked device can be an Access Point, but isn’t necessarily. The guards’ commlinks could be a closed network that only connect to one another, and not to any overbranching security system, for instance. In that case, Marking the comlink won’t get you into the security system… unless the guard walks into the security room, then you can use the commlink as a Repeater and hack into that zone and use it as an Access Point from there. (It does not matter if the guard moves away again after this, your (quatronic) location will already be the security room.)
No distance modifiers for your Repeaters is not OP, because of the difficulty of getting a Repeater so far away from you in the first place, without it being just Reset, or found and shut down. There are tech savvy people in every organization, they will find even a stealth repeater on their daily searches within a few or even one day. Also, remember that a Repeater is an Access Point to your gear, too! A hacker who leaves an active Repeater on an enemy base without severing the connection deserves to be hacked by a team of security hackers, they’d have all the time in the world to gather up and get ready to smoke every bit of tech you have, determine your identity, location, etc…