We finish our ghost pointer spike by displaying multiple pointers from multiple users. With that done, we revert back to our main development branch and plan our attack. After that, we modify our code to send the pointer location from everywhere in the document, not just when it’s over the drawing area.