R By adapting the unusable interface of the adaptee,
we ensure reusability of previously unusable legacy code.
S+ By giving clients a modified external interface to
sensitive functionality we can hide certain capabilities that we do not want
them to be aware of; the first step to having a secret stolen is knowing that
there is one to steal.