i don't understand how we could be being exploited if we are making all the +EV calls and folding the rest?