A system has been built in many safeguards to prevent anyone from taking over the system. For example, the probes don’t have any open ports that one can connect to (even locally) - they only support outgoing connections. The probes also use mutual authentication between the probes and the infrastructure components. Of course, it cannot be absolutely certain that an attack could not be carried out. The limited capabilities and the obscurity of the individual probes make the system an unattractive target, and that the current protection mechanisms are adequate.