Introduction:
1、Y Combinator is hiring hackers

Y Combinator is hiring hackers ♂
Y Combinator has a small team that makes the software that runs YC. Hardly any investors write software, but YC was started by hackers so it’s natural for us to solve our problems that way.
The YC software is used by a relatively small number of people—mostly the YC partners and founders—but the users are sufficiently important that through them we are able to have huge leverage. YC has ambitious plans to create more innovation in the world, and the only way to reach that level of impact is to scale through software.
We’re looking for a couple of great hackers to join us. It’s not a job for everyone, but it could be a good fit for someone who likes startups. ?If you’re a hacker, have a look at the job description. If it feels like a good fit, we’d love to hear from you. If not, our startups are hiring people of all kinds, so?have a look at them too.
Creative AI Engineer ♂
Machine learning can now do some extraordinary things: it can understand the world, drive cars, write code, make art.
But, it is still extremely hard to use. Research is typically published as a PDF, with scraps of code on GitHub and weights on Google Drive (if you’re lucky!). It is near-impossible to take that work and apply it to a real-world problem, unless you are an expert.
We’re making machine learning accessible to everyone. People creating machine learning models should be able to share them in a way that other people can use, and people who want to use machine learning should be able to do it without getting a PhD.
With great power also comes great responsibility. We believe that with better tools and safeguards, we will make this powerful technology safer and easier to understand.
We're a bunch of hackers, engineers, researchers, and artists.
We obsess about the details of API design and the right words for things. We're defining how AI works so we'd better get it right.
We make fast and reliable infrastructure. That's what a good infrastructure product is. We're not afraid to build things from scratch to make it the fastest.
We use AI for work. We use AI for play. We find unexplored parts of the map and create new techniques ourselves. We open-source it all.
We build in public, for the community. We want AI to work like open-source software so everyone benefits from it.
We're led by engineers. We all write code. (Or, we get ChatGPT to help.) There aren’t any meetings about meetings.
We've worked at places like Docker, Dropbox, GitHub, Heroku, NVIDIA, Scale AI, and Spotify. We've created technologies like Docker Compose and OpenAPI.
Related questions
Below is a sample template for a Hiring a Hacker Form with Terms and Conditions. This template is designed for ethical hacking services (e.g., penetration testing, cybersecurity audits) and emphasizes legal compliance. Always consult a legal professional to ensure adherence to local laws.
Ethical Hacker Hiring Request Form
Client Information
Full Name: ________________________________________________________
Email Address: ____________________________________________________
Phone Number: ____________________________________________________
Company/Organization: ____________________________________________
Job Title: ________________________________________________________
Service Details
Target System/Network:
- Describe the system/network to be tested:
- Describe the system/network to be tested:
Purpose of Engagement:
- Penetration Testing
- Vulnerability Assessment
- Cybersecurity Audit
- Incident Response
- Other: ________________________
Authorization:
- Confirm you own or have legal authority to test the system/network:
[ ] Yes
[ ] No
- Confirm you own or have legal authority to test the system/network:
Timeline:
- Start Date: __________
- End Date: __________
Terms and Conditions
By submitting this form, you agree to the following terms:
Legality:
- Services are for ethical purposes only.
- Any unauthorized access, data theft, or malicious activity is strictly prohibited.
Authorization Proof:
- Client must provide written authorization (e.g., signed contract, scope of work) before services begin.
Confidentiality:
- Both parties agree to keep all findings, data, and communications confidential unless required by law.
Liability:
- The service provider is not liable for:
- Unintended system downtime or data loss.
- Legal consequences of unauthorized testing.
- The service provider is not liable for:
Payment Terms:
- Fees: $_________ (due upon completion or as agreed).
- Late payments incur a 5% monthly penalty.
Termination:
- Either party may terminate the agreement with 48 hours' written notice.
Governing Law:
- This agreement is governed by the laws of [State/Country].
Declaration
- I confirm that I have read and agree to the terms above.
- I certify that I have legal authority to authorize this engagement.
Signature: ___________________________
Date: _______________________________
Submission
Return this form via email to security@yourcompany.com or submit through our secure portal.
Disclaimer:
This form is for ethical and legal cybersecurity services only. Unethical hacking is illegal. Consult a lawyer to ensure compliance with local regulations.
Important Notes
- Always verify the credentials of the ethical hacker/company (e.g., certifications like CEH, OSCP).
- Use a legally binding contract in addition to this form.
- Retain records of authorization and communications.
Let me know if you need adjustments or additional clauses! 馃敀
hiring a hacker form with terms and conditions(Terms & Conditions)
hiring a hacker form with terms and conditions dos(Terms of use)
hiring a hacker form with terms and conditions doc(What Is a Hacker?)
hiring a hacker form with terms and conditions doc

评论已关闭