“Your analogy to an aggression of private property appears weak as the same can extend to all forms of data copying and transfer where you are not the party sending or receiving or otherwise have no immediate interest.”
Can you give an example for at least a form of data storage? You refer to copying and transfer; it comes to my mind Nostr and the relays, and that’s not what I’m referring. Don’t tweak the argument.