INTRODUCTION_
Ghost Hack
A cyberbrain connects the brain directly to the network. If it’s breached and its barriers are bypassed, your own Ghost can be hijacked. This is referred to as “Ghost Hack.” Additionally, if you have the target’s Ghost intrusion key, you can take control of them without the need for hacking.