The document discusses parasitic computing, a programming technique that allows a program to exploit authorized interactions with another program to perform complex computations without permission. This method is presented alongside its ethical considerations and a technical description of how it operates over TCP/IP networks, where machines unknowingly contribute to solving NP-complete problems. The technique, while non-invasive, raises questions about resource consumption and trust in internet communications.