The best of them are; exploiting requires someone to be exploited though.

Reply to this note

Please Login to reply.

Discussion

No replies yet.