Rather than bootstrapping their security, rollups can connect to Polkadot through its virtual cores by acquiring coretime with DOT and tap into Polkadot's multi-billion shared security. By doing this, they inherently entry Polkadot's safe interoperability and can talk to other programs operating on distinct cores of Polkadot's Digital CPU.Bovendien