The product behaves differently than other products like it, in a way that is observable to an attacker and exposes security-relevant information about which product is being used.