...
The second execution order involves the same operations, but t2 starts and finishes before t1.
Compliance with CON04-J. Synchronize Use private final lock objects to synchronize classes that may interact with untrusted code using a private final lock object can reduce the likelihood of misuse by ensuring that untrusted callers cannot access the lock object.
...