it reduces the chance of attackers using vulnerable code by removing it entirely if it is unnecessary. In that way