We will execute the benchmark, note performance issues, address each issue individually, and attempt the benchmark in a final pass with all of the issues addressed.
This allows a set-user-ID (other than root) program to drop all of its user privileges, do some un-privileged work, and then re-engage the original effective user ID in a secure manner.
This byte code level change, although a big step, does not in itself bring us to true bootstrapping because we are still left with the JDK dependencies.
That is to say, as a reward for bravery, exhibited bravery, the hero should be allowed to kiss anyone they like while they are on patrol, male or female.