Securing Against Log4Shell: constraints v resolutionStrategy

I am curious how this compares to the Log4Shell guidance provided on your blog. In other words, is there a reason to prefer constraints over resolutionStrategy?