Comment by trinsic2
2 days ago
> you want access to something
Object.
Internet, communication medium <- not a physical object.
If it was a device that you were using to access that communication, then yes I would agree with you, but at that point they would have to age-gate the computer that gives you that access.
This is clear as day and all you are doing ins proving yourself wrong.
No comments yet
Contribute on Hacker News ↗