Rather than bootstrapping their protection, rollups can connect to Polkadot by way of its virtual cores by shopping for coretime with DOT and faucet into Polkadot's multi-billion shared security. By doing this, they inherently access Polkadot's protected interoperability and will communicate with other purposes functioning on distinctive cores of P