So, the KVM switch with the EM78P447SAM "weird CPU" has been classified as "unsafe" even if nobody on the planet Earth (except someone really crazy) would like to hack it,
but those guys in the QA office said to me that a "Military-Grade" KVM Switch *must be* Hacker-Proof not because you cannot find the datasheet/SDK/whatever regarding the chip, or because you find that the MPU is so a pain in the ass to be hacked and reprogrammed that you would really prefer desoldering and replacing the chip with something more friendly (Teensy 4.0? it was the first thing I thought, anyway) ...
but rather *because* each of these "super safe" products *must* offer -
hardware-based data isolation and protective measures against port-to-port data leakage - (their words), further reducing the risk of unauthorized access ... and, beside the data security, they want to read a signed legal piece of paper where it's written black on white that the secure KVM Switch with USB unit *must* also sport several fail-safe physical security features, tested and proved to be 100% working in each scenario, including
tamper-evident tape (wtf?!?) on the casing that reveals a broken seal, as well as "automatic disabling of the unit" (disable channels and halt) in the event of a breach in the physical casing.
O_M_G