That page does not address rootless Docker, which can be installed (not just run) without root, so it would not have the ability to clobber firewall rules.
This item has no comments currently.
It looks like you have JavaScript disabled. This web app requires that JavaScript is enabled.
Please enable JavaScript to use this site (or just go read Hacker News).
That page does not address rootless Docker, which can be installed (not just run) without root, so it would not have the ability to clobber firewall rules.