So all of this means that I can hack devices that are inside a host, even without gaining access to that host? What would even be the purpose of hacking into a host then? Am I missing something?
Edit: Also, if Icons inside a host are not unhackable from the outside, does a Host provide any protection to the icons inside it in that scenario?
You can only go 1 Host deeper hacking-wise, so if the Host is layered, you need to get in. Furthermore, Hash Checks require User access, so for that you need to get in first. Edit File also is User/Admin, so unless you're ready to target each file individually first, I imagine you need to enter the Host to easily deal with them.
Seems like a good direction for further shaping of the (still "malleable"

) Matrix/Host rules. Part of the current ambiguity here comes from the phrase "getting access", which some interpret as "getting the
right to enter" and some as just "entering". In the case of hosts, the latter makes more sense - and not just because there needs to be reasons to actually enter a host so the Black IC doesn´t get bored.
Just look at the rest of the terminology: The term "Outsider Access" implies that Matrix Actions like Data Spikes etc. can be done from outside the host, i.e. without entering it and exposing yourself to IC. But at the same time, "Outsider Access"
also implies that the higher Access Levels actually require you to enter the host - and not just to have the "right" to do so.
And then there´s "Backdoor
Entry". With a name like that, it would be super counterintuitive if that action doesn´t actually make you enter the host. To me, that sounds like the sneaky, illegal Version of "Enter host". And to that, you just have to add "Brute Force" as the noisy, illegal alternative (Yes, these two also let you access other Networks. But when it comes to hosts, they
should give you the same effect as "Enter Host", just illegal).