Is Ghosting an exploit?

Printable View