"It would exclude from the application of a provision relating to circumvention of technological measures persons who use a program, in the form of firmware or software, to enable a wireless telephone handset, or other wireless device that can connect to the Internet, to be connected to a different wireless telecommunications network from that of the operator it was originally acquired from." . . . .