← Back to context Comment by jxf 3 years ago This reads like the Ferengi Rules of Acquisition. 0 comments jxf Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗