If your attack vector is breaking and entering, that's a pretty effective cybersecurity mechanism.
But even if it happened, this is one of many additive entropy mechanism, removing or controlling only one source would not be sufficient for any attack.