As long as you are free to modify the hardware or purchase specific non-conforming hardware I see no reason why this would be painful for a hacker.
As long as you are free to modify the hardware or purchase specific non-conforming hardware I see no reason why this would be painful for a hacker.