Part 3/7:
However, the open-source model comes with its own set of challenges and criticisms. Just because a technology is made open for public use does not guarantee that it cannot be manipulated or compromised. History has shown that even widely-used open-source software can be exploited. An example discussed was a long-standing Linux bug discovered after a decade, indicative of potential backdoors embedded for malicious purposes.