“You see, if someone wants to control you with a computer, they have to put the computer where you are, and they are not, and so you can access that computer without supervision. A computer you can access without supervision is a computer you can change,

