My opinion is that the US already has access to Apple devices data. If we consider this to be true, what the UK is trying to do it's to match a possible enemy capabilities. Is this a valid point though? This woudn't make this action less wrong, I must to be clear, but it would be more undestandable.
blackbeard
joined 2 years ago
That's disgusting
This is pretty interesting, I never used that before and I will have a look. However, it would be also interesting using my approach, use a local interface where the traffic is already filtered, that can be used on other scenarios.
There is probably something on a docker configuration telling that all my traffic should go out from the default interface.