Every once in a while, a new tool is developed that is so much more effective than what was previously available that it spreads through people like a wild fire.
See how to encrypt and decrypt stream, byte[], or string using the Asymmetric JCE Cryptography module in Mule 4 taking an API as the reference implementation.
There are multiple approaches to an unsupervised anomaly detection problem that try to exploit the differences between the properties of common and unique observations.