This is a bad precedent, information devices are fundamentally different because they are connected to a network, and therefore should be subject to protections the network establishes.
↧