Comment by michaelt
4 years ago
Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
4 years ago
Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
No comments yet
Contribute on Hacker News ↗