Security through minority is an approach that relies upon infrequently-used code for its effectiveness.
The approach is a subcategory of security through obscurity, which depends upon secret or little-known code to provide protection. Security through minority relies on the knowledge that hackers looking for vulnerabilities to exploit typically seek commonly-used software to maximize their sales of malware and hacking scripts and increase the number of computers they can reach.
A related strategy, security through obsolescence, depends on the fact that obsolete software is a less-attractive and more difficult target for an attacker. Security through minority, security through minority and security through obscurity are all deprecated approaches. The preferred model is security by design, which seeks to make systems as impervious to attack as possible through their conception and development.