diff --git a/autoload.php b/autoload.php
index 1e5ad34e3ba8c6293196a4f1a9dd308b5594dfbb..477f243b213586d3abb4527f109661cfe07cc3b5 100644
--- a/autoload.php
+++ b/autoload.php
@@ -8,7 +8,6 @@
  * @see index.php
  * @see core/install.php
  * @see core/rebuild.php
- * @see core/modules/statistics/statistics.php
  */
 
 return require __DIR__ . '/vendor/autoload.php';
diff --git a/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php b/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php
index 4a576388262cdd7077c2743855ab6904986c51d9..6123a838ab3e6f22271c60a92d2c057b02b8a3f0 100644
--- a/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php
+++ b/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php
@@ -113,7 +113,6 @@ protected static function autoLoadContents($relative_autoload_path) {
  * @see index.php
  * @see core/install.php
  * @see core/rebuild.php
- * @see core/modules/statistics/statistics.php
  */
 
 return require __DIR__ . '/{$relative_autoload_path}';
diff --git a/core/assets/scaffold/files/default.settings.php b/core/assets/scaffold/files/default.settings.php
index 63fb2df74a1bc9faf82fc5a72d9a76e090d6f20c..98b25a83581d09193996e01d01affcb2f0c43272 100644
--- a/core/assets/scaffold/files/default.settings.php
+++ b/core/assets/scaffold/files/default.settings.php
@@ -355,14 +355,13 @@
  * security, or encryption benefits. In an environment where Drupal
  * is behind a reverse proxy, the real IP address of the client should
  * be determined such that the correct client IP address is available
- * to Drupal's logging, statistics, and access management systems. In
- * the most simple scenario, the proxy server will add an
- * X-Forwarded-For header to the request that contains the client IP
- * address. However, HTTP headers are vulnerable to spoofing, where a
- * malicious client could bypass restrictions by setting the
- * X-Forwarded-For header directly. Therefore, Drupal's proxy
- * configuration requires the IP addresses of all remote proxies to be
- * specified in $settings['reverse_proxy_addresses'] to work correctly.
+ * to Drupal's logging and access management systems. In the most simple
+ * scenario, the proxy server will add an X-Forwarded-For header to the request
+ * that contains the client IP address. However, HTTP headers are vulnerable to
+ * spoofing, where a malicious client could bypass restrictions by setting the
+ * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
+ * requires the IP addresses of all remote proxies to be specified in
+ * $settings['reverse_proxy_addresses'] to work correctly.
  *
  * Enable this setting to get Drupal to determine the client IP from the
  * X-Forwarded-For header. If you are unsure about this setting, do not have a
diff --git a/core/lib/Drupal/Core/Render/Element/Link.php b/core/lib/Drupal/Core/Render/Element/Link.php
index b84a1b6ab5a4a46c4a0bcd8ea492ff8ab14a2c3b..ea2c35f46b9fcac4bef9887a2859c9a1f731f30b 100644
--- a/core/lib/Drupal/Core/Render/Element/Link.php
+++ b/core/lib/Drupal/Core/Render/Element/Link.php
@@ -136,13 +136,6 @@ public static function preRenderLink($element) {
    *       // passing in to links.html.twig.
    *     ),
    *   ),
-   *   'statistics' => array(
-   *     '#theme' => 'links__node__statistics',
-   *     '#links' => array(
-   *       // An array of links associated with node statistics, suitable for
-   *       // passing in to links.html.twig.
-   *     ),
-   *   ),
    *   'translation' => array(
    *     '#theme' => 'links__node__translation',
    *     '#links' => array(
diff --git a/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig b/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig
index 957e400405929e769ef1bf49d03943483676f693..7dfc73067257d4bd242705d4ae46d2a969501890 100644
--- a/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig
+++ b/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig
@@ -2,7 +2,6 @@
 label: 'Viewing lists of recently-updated content'
 related:
   - core.tracking_content
-  - statistics.tracking_popular_content
   - history.tracking_user_content
 ---
 {% set recent_link_text %}
diff --git a/sites/default/default.settings.php b/sites/default/default.settings.php
index 63fb2df74a1bc9faf82fc5a72d9a76e090d6f20c..98b25a83581d09193996e01d01affcb2f0c43272 100644
--- a/sites/default/default.settings.php
+++ b/sites/default/default.settings.php
@@ -355,14 +355,13 @@
  * security, or encryption benefits. In an environment where Drupal
  * is behind a reverse proxy, the real IP address of the client should
  * be determined such that the correct client IP address is available
- * to Drupal's logging, statistics, and access management systems. In
- * the most simple scenario, the proxy server will add an
- * X-Forwarded-For header to the request that contains the client IP
- * address. However, HTTP headers are vulnerable to spoofing, where a
- * malicious client could bypass restrictions by setting the
- * X-Forwarded-For header directly. Therefore, Drupal's proxy
- * configuration requires the IP addresses of all remote proxies to be
- * specified in $settings['reverse_proxy_addresses'] to work correctly.
+ * to Drupal's logging and access management systems. In the most simple
+ * scenario, the proxy server will add an X-Forwarded-For header to the request
+ * that contains the client IP address. However, HTTP headers are vulnerable to
+ * spoofing, where a malicious client could bypass restrictions by setting the
+ * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
+ * requires the IP addresses of all remote proxies to be specified in
+ * $settings['reverse_proxy_addresses'] to work correctly.
  *
  * Enable this setting to get Drupal to determine the client IP from the
  * X-Forwarded-For header. If you are unsure about this setting, do not have a