Which VPN Services Take Your Anonymity Seriously?

1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long?

2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?

3. What tools are used to monitor and mitigate abuse of your service?

4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?

5. What steps are taken when a valid court order asks your company to identify an active user of your service?

6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?

7. Which payment systems do you use and how are these linked to individual user accounts?

8. What is the most secure VPN connection and encryption algorithm you would recommend to your users?



liquid1. Absolutely not. We have customized our AAA (authorization, accounting and authentication) database so that there is very little data actually stored within the database. We have developed our own version of RADIUS for this very reason. Furthermore we use Mikrotik and our own heavily modified Gentoo kernel to completely silencing logging across all of our systems.

2. We operate from within the USA. There are only three instances where any information we collect would ever be shared. They are:

1. Billing Disputes (charge-backs/fraud) – Once a subscriber files a charge-back or billing dispute we will attempt to email them to verify and/or resolve the dispute. If we do not hear back from them within 7 days and they have an accumulated total of over 1GB of data transfer on our network then we will forward any information we have collected over to the credit card processor or PayPal in an attempt to resolve the dispute and to aid in any fraud investigation.

2. Court Order – If we receive a valid court order we will work closely with the law offices of McDonald Hopkins who specialize in Data Privacy and Network Security law and if applicable our ethics group. Then based on their evaluations make a decision on how to respond to the court order and publish it in a transparency report.

3. Ethics Violation – In the unlikely event that a complaint comes to us with a report from an attorney and an IT forensics analyst providing considerable proof that an ethics violation has taken place which will likely result in the harm of another human being our ethics team will publish the reports and original violation in a transparency report. They will review the complaint and if enough evidence exists to persuade them that an actual violation has indeed taken place they will update the transparency report with our intended course of action. We may start closing ports, creating null routes or adding layer 7 filters on the node in question. In some circumstances we may do nothing at all and in extreme cases we may even shut down the node to help mitigate the damage. The ethics group will then forward any information about the case to law enforcement agencies and qualifying NGOs.

Be it a court order, abuse report or ethics violation our code of ethics will be followed at all times.

3. Currently we use Zabbix to monitor the performance and load of our network it will notify us of anything it considers abnormal. We use OSSEC to monitor firewall logs, detect root-kits, login attempts and do system integrity checks. We use Layer 7 filters to mitigate most forms of abuse. Some filters are created on demand and are based on the type of abuse we are attempting to stop while others will run constantly searching for patterns.

4. When we receive take down notices we do the following:

– Verify that the claim is valid, not a duplicate and provides all of the required information laid out in 17 U.S.C. § 512(c)(3).
– Post the notice in a transparency report along with our intended course of action. Ranging from nothing, blocking ports, null routes, blocking files, rate limiting P2P or simply leaving the jurisdiction. We then create a layer 7 firewall rule that enables the step above.

Finally we respond to the take down notice letting the sender know that we do not condone the use of our VPN service to violate copyright laws and reassure them that we do not store any content our users upload or download on our servers and that our service is completely automated. We inform them that LiquidVPN is solely a transitory digital network communications provider as defined in 17 u.s.c 512(a) and that we are unable to delete any content that may be infringing or even identify a particular user that may be violating the copyrights of the media in question. We assure them that we have taken all of the steps within our power to stop the distribution of the media in question.

5. It really depends on the scope of the court order, reason for the order and jurisdiction the order is coming from. I would love to say it’s a black and white thing and that we would pull out of the jurisdiction no matter what but that’s just not true. If the court order is about an offence that violates our ethics policy and provides reasonable proof of the violation our ethics team will publish the order and any proof provided. The ethics team will be responsible for the decision to comply, fight or leave the jurisdiction. If they have determined the complaint is a violation and are able to comply by handing over the records of the offender then we will forward over all of the information we have regarding the user in question.

If the order does not know who the user is and they are asking for a more far-reaching type of access that will jeopardize the privacy of the users we contractually bound to protect and for the sake of argument have included a gag order then the ethics team will carefully go over the court order and decide if it is possible to fight it in court. If we must close down some or all of our network and relocate to another jurisdiction we are contractually bound to do so by our ethics policy. Users would either be directly alerted or indirectly alerted by the tripping of the warrant canary.

6. We do not believe in restricting P2P on our network because of how great of a file transfer service it is. So all servers are P2P-enabled but we only allow legal P2P in the USA and UK. Meaning we sometimes have to take measures in the USA and UK that render all P2P including legal P2P unavailable for a length of time. We allow ALL types of P2P in Romania, Netherlands, Germany and likely by the time anyone sees this Canada.

7. We accept Bitcoins, Cash, Check and PayPal. We only require an email address, password, first name and country to sign up for service so there is not a lot of information actually linked to a user’s account. With that being said, we do maintain a record of the data mentioned above along with the order #’s, total VPN logins and used bandwidth per account.

8. Well LiquidVPN has developed a technology called IP Modulation. It is a block of public IP addresses shared between all of the OpenVPN servers in a cluster (2+) that are handing out shared IP addresses. Everyone connected to these servers will share the same pool of public IP addresses and the IP addresses continuously and randomly rotate between users the whole time you are connected. It allows users to have all of the benefits of shared IP addresses, plus makes any kind of tracking from an external IP address much harder because there are potentially people from 2 or 3 servers grouped together and all broadcasting data on 30+ public IP addresses. I like to think of it as a game changer for privacy.

So if it were me I would connect to one of the modulating OpenVPN servers that offer AES-256-CBC cipher and SHA512. With the optional IPS firewall enabled. If I am on a Laptop or PC with a good processor I might elect to use one of the configurations that include TLS-DHE-RSA-WITH-AES-256-CBC-SHA but using TLS-DHE-RSA-WITH-AES-256-CBC-SHA with IP modulation requires a LOT of processor power so it is only really recommended for certain users.

LiquidVPN website


airvpn1. No, we don’t keep any log that might be exploited to reveal customers’ personal data during connections, including real IP address. For example OpenVPN logs are sent to /dev/null (Air is based on OpenVPN). Our privacy policy is available here: https://airvpn.org/privacy

On top of that our VPN servers do not maintain any account database.

2. Italy. We do not share any information with any 3rd party.

3. Automatic triggering based on patterns to detect and if possible block as soon as possible various types of attacks (for example UDP floods) against or from our servers.

4. They are ignored. Now and then we reply asking for a more substantiated proof and asking to disclose the technical method according to which a takedown notice has been prepared, but so far none of the entities we queried disclosed such information, in absence of which the notices pertaining to p2p are simply vague and unproven claims from some private entity.

5. No help can be given about past connections because we don’t log, monitor or inspect our clients traffic, and we don’t and can’t require a proof of identity from our customers. However, if the court order pertains to presumed actions which infringe our Terms of Service and in particular that in any way violate, directly or indirectly, or aid the violation of, the ECHR, we can try to help the court in the best way we can with subsequent investigations and if possible with the help of proper and competent authorities.

6. Yes. p2p protocols are perhaps a set of the most exciting protocols invented in the last 12-13 years, so they are actively encouraged on every server. We do not discriminate against any application or protocol, in compliance with our mission and to stay a mere conduit of data.

7. We accept Bitcoin, many credit cards, PayPal. Each payment is linked to an account only in order to provide service delivery and to comply to our refund policy.

8. We put into practice the recommendations of security expert and best practices on our setup, based exclusively on OpenVPN with the following features:

RSA keys size: 4096 bit
DH keys size: 4096 bit
OpenVPN Data Channel: AES-256-CBC
OpenVPN Control Channel: HMAC SHA1
TLS Auth: Yes
Perfect Forward Secrecy: Yes (keys are re-negotiated at each new
connection AND every 60 minutes, through DHE)

The client key is used to authorize the access to the system, not to encrypt the data channel, so that even if an adversary catches the client private key, the client traffic can’t be decrypted.

AirVPN website


vpns1. We do log connections to the servers for providing troubleshooting support to our customers, but these logs are securely and automatically deleted once every 24 hours. Manual weekly reviews are done to ensure the automated process has been carried out as intended by our systems.

2. The company (VPNSecure Pty Ltd) is registered in Australia. The following customer information is stored “username / password / email address”, we do not share this information with any third party.

3. We mitigate SPAM email sending, we employ simple Port blocking to standard email ports, customers with Dedicated IPs can enable email sending. In extreme cases we may employ a simple “string” match in our firewall which does not Log any traffic it simply denies the forwarding traffic containing the string parameter in our firewall.

4. Requests in regards to DMCA are answered, unfortunately we are unable to determine which user is responsible for the DMCA notice and therefore cannot provide any further information to these notices.

5. Requests from law enforcement are sent directly to our Legal team. Requests are always different and are handled as per the request made, but generally we are unable to provide any definitive information due to the reasons outlined in questions 1 & 4.

6. Torrents are allowed over our network.

7. We provide PayPal / AlertPay / Perfect Money / Bitcoin / Cashu / Skrill / Credit Card.

We recommend that customers use anonymous payment methods such as Bitcoin (preferred) or Perfect Money. The Transaction ID is stored against the “username” to help mitigate chargebacks and reversals from main stream payment providers.

8. OpenVPN is recommended since it’s the most flexible and secure VPN protocol available, using 2048 bit Keys, available over both UDP and TCP. We have also planned a traffic obfuscation feature to further protect detection of VPN traffic for our customers.

VPN.S website


vpnac1. We keep connection logs for one day only, in order to help us troubleshoot some common problems: invalid logins, router VPN pass-through issues, etc. These include source IPs, connection start/end time and bandwidth usage. However, we do not log any traffic data.

2. Our company is legally registered in Romania. We won’t share anything with any 3rd party unless we are forced to do so under a Romanian court order/subpoena, and this has not yet happened. EU Data Retention Directive (2006/24/EC), widely misinterpreted and used as a reference, does not apply to us, since we are not an ISP or a telecom provider.

3. We do not monitor anything, but we can obviously intervene to stop ongoing abuse, such as spamming, mass-scan etc, if demanded by our hosting partners. We can do this without logging or monitoring anything simply by blocking malicious traffic on affected servers using iptables.

4. We use shared IP addresses, so it is virtually impossible to identify users involved in copyright infringement – even if we wanted to do that. There is nothing to share both due to technical limitations and to our commitment to respect customers’ privacy. We reply that the content is not stored on servers.

5. This has not yet been the case, so we do not really know. Were such to happen, we would work closely with our lawyers and consider all options available.

6. We allow file-sharing only in certain locations. We don’t allow it everywhere, especially in US locations, because it would create some problems – not only for us, but to other customers expecting us to deliver a reliable service.

7. Mainly Paypal and Bitcoin, but also Credit/Debit and lots of prepaid cards, virtual currencies and other methods. Personally identifiable information, such as names, may be provided by customers upon placing an order.

8. We offer AES-256 cipher for data encryption, PFS (hourly rekeying), SHA512 HMAC with 4096-bit RSA keys, generated the right way: offline on a secure machine, using multiple sources of entropy.

DNS queries are encrypted between VPN nodes and DNS resolvers. Resolvers generate millions of DNS queries to existing domains, mixing this script-generated “noise” with legitimate queries of our VPN users, to ensure that potential wiretapping/monitoring against our DNS resolvers will be totally ineffective.

VPN.ac website

Perfect Privacy

pplogovpn1. No. Our service and its infrastructure was designed in a way so that we can not possibly track users even if we wanted to. We keep no connection logs whatsoever.

2. Our servers are operated in accordance with the law of the respective country they are located in. If we are required by law (court orders) to cooperate we will do so to the extent that is possible: Since we do not store any data that can be used to track or identify users, this cooperation is usually limited to a brief correspondence.

3. We do not monitor any activity except for general usage and bandwidth of our servers so we can provide this information on our server status page. Should abuse occur it is dealt with on an individual basis.

4. Because we do not host any data related to copyright violations, DMCAs do not directly affect us. Should a company try to use a DMCA to get to our users we kindly explain that as a VPN we have no information about who is responsible for which traffic.

5. As answered above, we do comply with court orders when required by law. By experience, our initial reply explaining that we are an anonymizing service and do not have any data that could be used to identify our users, is enough to settle the issue.

6. Yes, BitTorrent and other file-sharing is allowed on almost all servers (some datacenters, especially US-based ones block torrent traffic).

7. We offer a variety of payment options ranging from anonymous methods such as sending cash, Bitcoin or PaySafeCard. However, we also offer payment with Credit Card and PayPal for users who prefer that option. We keep no data about the payment except for when the payment was received which is linked only to an anonymous account number.

8. While we offer a range of connection possibilities we would recommend using OpenVPN with 256 bit AES encryption.

Perfect Privacy website


unspyable1. We keep no logs whatsoever.

2. USA and UK VPN services are provided via our USA offices which also includes our billing system. Our offshore VPN network (Cyprus, Czech Republic, Hong Kong, Iceland, Netherlands, Norway, Panama, Russia, Sweden and Switzerland) is physically isolated from our USA operations and shares no connection to it.

We will not provide any information to anyone unless they are an authority having jurisdiction, in which case we would cooperate with them. However, since we keep no logs of anything we have very little to provide them. Anything we have to provide them such as customer names can be gotten from the customer’s credit card company or the payment processor much more efficiently. Bitcoin is one of our payment options and can help minimize access to such information.

3. We don’t monitor anything. If we receive notice of criminal activities we will use non-invasive techniques (without logging) to try to determine who the user is and terminate their access. None of the previous paragraphs applies to P2P activities which are allowed on all servers except in the USA and UK where packet filtering is used.

4. Our offshore servers where P2P is allowed are in countries and datacenters that do not forward such notices. If we were to receive such a notice we would reply to it appropriately. Since we don’t log anything our reply would not include any information on the user.

5. If we were to receive a request from an authority having jurisdiction we would cooperate with them. However since we keep no logs of anything we have very little to provide them. Anything we have to provide them such as customer names can be gotten from the customer’s credit card company or the payment processor much more efficiently and without us even knowing about it. Bitcoin is one of our payment options and can help minimize access to such information.

6. It is allowed on what we define as our offshore servers (see question 2). It is not allowed on USA and UK servers due to the issues involved. There is no benefit to the user to use USA or UK servers over the offshore servers for P2P. Therefore we do not believe this to be any limitation to our users.

7. Bitcoin, Amazon Payments and PayPal. Our online authentication servers contain no customer personal information. We keep customer email addresses offline in case we need to contact the customer for some reason. We do not keep any other personal information regarding the transactions. Obviously the payment providers have a record of the transaction as well that is beyond our control.

8. We recommend OpenVPN with 256 AES and 2048 bit RSA. For maximum privacy we recommend our multi hop servers. However, due to the multiple hops they will not be the fastest for P2P or streaming applications.

Unspyable website


hideme1. We have developed our system with an eye of our customer’s privacy, so we created a distributed VPN cluster with independent public nodes that do not store any customer data or logs at all. Link: https://hide.me/en/legal#privacy

2. We’re a Malaysian incorporated company which is not subject to any mandatory data retention laws. We strictly do not log any personal data to avoid legal liability, and to ensure your online privacy. Furthermore we do not store any logfile on our VPN servers, it’s not our job to monitor or filter your data.

3. We only offer our services based on our ToS, and we have a zero tolerance on any kind of abuse. Nevertheless it is not our job to monitor or control our user’s activities, that’s also a main reason why we don’t throttle or block any kind of traffic.

4. Since we don’t store any logs and/or host copyright infringing material on our services, we’ll reply to these notices accordingly.

5. The company is incorporated in Malaysia. If a court order is received from a recognized legal authority with jurisdiction over hide.me then the company shall comply with that order. However, the company cannot be compelled to hand over information which it does not have. When a customer signs up we request as little information as possible; a valid email address. If it ever becomes required by law for us to keep a persistent log of our customers connections or any personal data relating to their network activity, we will immediately notify our customers and do everything in our power to move jurisdictions or close the service to protect those who entrust their privacy to us.

6. BitTorrent is allowed on all locations without restrictions. However, we encourage our users to avoid the US/UK locations for their filesharing activities.

7. We support over 80 international payment methods, including Paypal, Credit Cards, Bank transfer, PaySafeCard and UKash.
All payments are handled by external payment providers and are linked to a temporary payment ID. This temporary payment ID can not be connected to the users VPN account/activity. After the payment is completed, the temporary payment ID will be permanently removed from the database.

8. Our most secure VPN connection is IPsec over IKEv2 (AES-256 / SHA-512) and OpenVPN with AES-256 using a 4096-bit SHA-512 HMAC authentication. We strongly recommend IKEv2 since it’s performaning really fast and is more reliable than OpenVPN.
We are one of the few providers that support a wide range of protocols: OpenVPN, IPSec (IKEv1 & IKEv2), L2TP/IPSec and PPTP.
Link: https://hide.me/en/features/protocols

Hide.me website


seed4me1. We do not monitor or do DPI on user connections, but we store session information for 7 days in order to support network health. This data is not stored on VPN servers itself but rather sent to central secure server. It is not shared or used for any other purpose then debugging connectivity issues.

2. Servers are located in US, UK, Hong-Kong and Netherlands, but we operate under Taiwanese jurisdiction now. In general, the location of VPN servers is not important, since there is no data stored. Even if it is confiscated, there is nothing to see. Authentication and accounting is happening in another place. Regarding enforcement agencies. We do not welcome illegal activities like CP, SPAM, hacking, abuse, DDoS. Our service was made to promote freedom and security, rather then harm other people. I always like to compare it with kitchen knife, you can cook the food or kill people with that. We do not want it to be used for the second. But our rule is simple – we do not share data regarding our clients. When we handle the complain, we do everything to stay legit and stop malicious activity with firewall.

3. We use a firewall to stop the activity, we do not have any special traffic monitoring system.

4. In order to function properly and provide services to the most of our clients we had to be proactive in fighting DMCA notices. We already had to process several dozens of them and even one of our servers was null-routed. So finally we came up with following rules: if a DMCA complaint is related to a single case of violation on a single IP address. We stop this violation with firewall, when it occurs and redirect the rest of the traffic internally through our network to another exit IP. Since we can not identify the user, but have to push the notice further, we do mass-mailing or publish the complain in Facebook. There are no circumstances requiring us to disclose client information so it never happened. We advise our clients to use servers in countries where P2P traffic is not monitored by Copyright Agencies.

5. We are not aware of any legislation requiring to share client information and we are not aware of any precedents in Taiwan, where client information was disclosed. We do not hold much information anyway. But again, we are not welcome illegal activities which potentially harm other people.

6. Currently P2P and BItTorrent traffic is restricted with a firewall on US servers, users are welcome to use these protocols in Netherlands for instance. VPN gives an opportunity to change jurisdiction virtually, why somebody would want to violate the rules if it is possible not to?

7. We accept PayPal and Bitcoin straight from the website. We store the transaction ID in order to prevent double payments, the rest of information is handled by PayPal payment system. Bitcoin is fairly anonymous and we generate a new payment address for every transaction.

8. We use the best what’s possible from PPTP, it is MMPE 256-bit encryption. Our experiments show that PPTP is a good trade-off between performance, security and easy setup for the user. Recently L2TP has been launched in production mode on all servers and we are updating the website to provide automatic configuration support. L2TP/IPSec with 1024 key encryption would be the most secure option, but not necessary fastest one, since it requires a lot more computations from both sides.

Seed4.me website

ShadeYou VPN

shadeyou1. ShadeYou VPN does not keep any logs. The highest level of privacy is a main mission of ShadeYou VPN. Everybody can read our Privacy Policy here – http://shadeyouvpn.com/privacy-policy . To use our service only a username and e-mail are required. No personal or real data is required.

2. ShadeYou VPN company operates under the jurisdictions of The Netherlands. There are no existing cases according to which we can share some information with 3-rd parties. Even if such situation will appear, we just don’t have any information that can shared with third-parties because we don’t keep any kind of logs.

3. We absolutely do not monitor any traffic or user activity. Even if we receive a serious abuse nitofication we can’t start monitor our users because it will violate main mission of ShadeYou VPN.

4. The abuse team of ShadeYou VPN answers as follows:

a) we do not store any illegal content on our servers;

b) every our user agrees with our privacy policy while registering, so we warned that illegal actions are prohibited and at this time we are not responsible.

c) we have no any personal data of our users or any logs of their activities that can be shared with third-parties because we simple do not store it.

5. Sharing any personal data of our users is absolutely impossible since we do not store it and do not keep any logs.

6. BitTorrent and any other file-sharing traffic allowed on all our servers. There’s only one exception, and that’s for users who use a trial version.

7. ShadeYou VPN uses payment systems including PayPal, Perfect Money, Webmoney, Qiwi, Yandex Money, Easy Pay, Ligpay, also accept payments via Visa, Master Card, Maestro. Bitcoin will be added soon.

8. ShadeYou VPN offers PPTP, L2TP and OpenVPN. Every user can choose the protocol he or she requires. We strongly recommend to use OpenVPN since it is the most safe and uses the strongest encryption.

ShadeYou VPN website


SecureVPNto1. We do not log the IP, the source or destination of our costumers traffic or any other individually identifying information.

2. Each server is handled with the jurisdiction at the servers location. Since we do not log anything, we have no information to share with any authority.

3. There are no tools which monitor our costumers. If it comes to an abuse, we have techniques which don’t need any logging to prevent any further abuse.

4. As already mentioned, we keep no information about our costumers. We will reply to the DMCA takedown but we can’t provide information which we don’t have.

5. This didn’t happen yet but if we would be forced to identify one of our costumers at a specific server location, we are going to cancel this server. Under no circumstance we are going to log, montior or share any information about our costumers.

6. Yes it is allowed on all servers.

7. We are offering a wide range of anonymous payment methods like Bitcoin, Litecoin, Feathercoin, Worldcoin, Dogecoin, Megacoin, Perfect Money, Paysafecard and Ukash. All transactions are processed by our own payment interface. No third party payment processor receives information about any payment. We use a random transaction ID which will be deleted after the payment is completed.

8. We would recommend OpenVPN, available in UDP and TCP mode. We are using AES-256-CBC for traffic encryption, 4096 bit RSA keys for the key exchange and SHA-512 as HMAC. These settings offer you the highest grade of security available.

SecureVPN.to website


switchvpn1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long?

SwitchVPN does not monitor, record, store any kind of users activity or IP addresses,Therefore its impossible to pin point any user at any time.SwitchVPN uses Shared IP address,
which means same Public IP is being used by other users too ,therefore making it further incapable to track any user.
In order to maintain our top notch service,troubleshoot any performance issues,to protect service from getting abused on the server we log only duration of VPN connections,
bandwidth consumed and VPN server connected which by no means allow us to match an IP address and a time stamp. These logs are regularly recycled and destroyed automatically.
Thereby making our service absolutely anonymous and safe along with high quality service experience.

2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party?

SwitchVPN operates under Indian jurisdiction. We do not store any user logs and therefore no question arises of sharing the information to a 3rd party. Our client’s privacy is of utmost importance to us.

3. What tools are used to monitor and mitigate abuse of your service?

We have firewalls and filters in place to block spamming and filters on US servers to block p2p activity to prevent DMCA notices.

4. In the event you receive a DMCA takedown notice or European equivalent, how are these handled?

As mentioned previously,we have filters in place to block the torrents on Non P2P servers, We do not receive DMCA notices as download is already blocked in first place.

5. What steps are taken when a valid court order requires your company to identify an active user of your service?

As we do not hold any logs and also we use shared IP, its impossible to identify any user at any time.

6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?

We allow Bittorrent on all servers except VPN servers based in US.However we request our clients to use Netherlands, Romania, Russian, other servers which tolerate p2p and are specially optimized for p2p usage.

7. Which payment systems do you use and how are these linked to individual user accounts?

We accept all the leading payment methods like Bitcoin, Perfect Money, PayPal, Credit Card, PaySafeCard, Skrill, WebMoney and AliPay.

8. What is the most secure VPN connection and encryption algorithm you would recommend to your users?

We recommend our clients to use OpenVPN with 256 AES ,2048bit RSA and L2TP Over IPsec which also uses 256bit AES Encryption for most secure VPN connection

SwitchVPN.to website

Is your favorite VPN not listed? Feel free to ask them to get in touch. We will gladly add any VPN provider with limited or no logs and a good privacy policy.

Note: several of the providers listed in this article are TorrentFreak sponsors and some compensate us for referrals.

Pages: 1 2 3

Tagged in: ,

Share this post

Share on Google+

You May Also Like

c There are 413 comments. Add yours?

comment policy