" the attacker would need to know the specific model of device in the victim, and have reverse-engineered its design to know which commands to send to write the necessary data into memory to cause harm."
Ah, so they're secure because they're obscure. Very good, then.