Merlin's Legacy: Daughter of Camelot by Carla Simpson, Merlin's Legacy (06) by Carla Simpson EPUB
A must read for fans of Game of Thrones and the Last Kingdom
Rianne: The only family I have ever known was brutally murdered when I was a child. I live by my wits, my skill with the stones that most times puts sufficient coin in my pocket, and my skill with both the blade and the bow. I am a survivor. I trust no one, especially the warrior who claims to have been sent by my blood family to find me. I am told they gave me up to keep me safe? I have no use for them.
Tristan: I have been sent by Lady Meg of Monmouth to find the child she sent away to safety years before as an infant. What I find, in a wretched hovel of an inn at the edge of the kingdom, is a foul-mouthed, grubby but talented thief who possesses an unusual kill at the game of Stones. She has no memory of her true family, and no desire to return with me. On top of that she would just as soon put an arrow through my heart.
xx
Merlin's Legacy_ Daughter of Camelot by Carla Simpson, Merlin's Legacy (06) by Carla Simpson EPUB
Merlin's Legacy_ Daughter of Camelot by Carla Simpson, Merlin's Legacy (06) by Carla Simpson.epub (564.3 KB)_ uploads will cease (your support needed - urgent - goal).txt (0.7 KB)_ DOWNLOAD free audiobook version.txt (1.0 KB)
Did you know that your ISP and government can monitor your torrent activity?
When you use torrent networks to download or share files, your online actions can be easily monitored by your Internet Service Provider (ISP) and government authorities. The protocol used by torrents, along with your IP address, makes it simple for them to trace your connections. Consequently, ISPs and government agencies have the capability to identify your torrenting activities.
To safeguard your privacy and evade tracking of your torrenting activities, we recommend using the direct download button. By utilizing the direct download option, you can acquire files directly without relying on torrent networks. This method enables you to securely and anonymously obtain the desired files without being tracked.