What to do if my java app is still vulnerable to log4shell after upgrading to the latest log4J?

My Java 11 application is being upgraded to fix the log4shell flaw. So first Spring Boot has been upgraded to the latest version.
As my project uses Maven to manage its dependencies, I set the log4j version in the dependencyManagement sect… Continue reading What to do if my java app is still vulnerable to log4shell after upgrading to the latest log4J?

What is the correct terminology for enforcing access control by means of cryptography, or on a privileged list?

I have a server that enforces access control by means of cryptography, by not giving up data, or by a combination thereof.

By the former (cryptography), I mean: If a user requests some data, the server gives it in an encrypt… Continue reading What is the correct terminology for enforcing access control by means of cryptography, or on a privileged list?

What is currently the best Searchable Encryption (SE) algorithm that works in practice?

I’m struggling to find good literature on Searchable Encryption. There are of course a few student papers written in LaTeX using Computer Modern that has some nice Greek soups in them, but none with any actual concrete exampl… Continue reading What is currently the best Searchable Encryption (SE) algorithm that works in practice?