The software has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.