...
The second execution order involves the same operations, but t2 starts and finishes before t1.
Compliance with CON07-J. Use private final lock objects to synchronize classes that may interact with untrusted code can reduce the likelihood of misuse by ensuring that untrusted callers cannot access the lock object.
...