Das bringst du mit
Must‑haves
*Strong backend engineering in Go (or Rust + willingness to Go).
*Comfort across the stack: APIs → CLI tooling → occasional front‑end tweaks.
*Opinionated about developer experience & simplicity.
*Genuine motivation to fix privacy (this will sustain you when the world shrugs).
*Ship mindset: iterate, measure, harden.
Nice‑to‑haves / Learn‑on‑the‑job
*Cryptography familiarity (AEAD, KEMs, FHE concepts).
*WebCrypto / WASM performance tuning.
*Experience with post‑quantum or key rotation strategies.
*Prior work on dev platforms (PaaS, serverless, edge runtimes).
Not required: Prior FHE implementation experience (we’ll encapsulate complexity).
Du bist gut mit...
- Zahlen, Daten und Logik
- Dinge vorantreiben und erledigen
- Strukturen und strategischem Denken
Du hast bereits...
- als Vollzeitbeschäftigter gearbeitet
Das erwartet Dich
*Design & implement performant, testable Go services (auth, routing, quota, encrypted storage).
*Evolve noisycli (Deno/Type-/Java-Script): sub‑commands, scaffolding, local dev emulator.
*Integrate & abstract FHE operations behind clean APIs (no cryptic knobs for users).
*Add PQC upgrade pathways (key rotation, hybrid key encapsulation) without breaking DX.
*Establish secure coding & review guidelines; instrument observability (metrics/logs/traces) without violating encryption guarantees.
*Collaborate on product shape (deciding which knobs we remove to keep the “one‑command” promise).
Das bieten wir
*Influence over architecture, hiring, and eventual org design.
*A platform to publish / speak (privacy & encrypted compute conferences).
*Option to grow into CTO / VP Engineering or remain IC—your path, transparently discussed.
*Early seat at the table for funding strategy (VC conversations underway; no promises).
Über unser Startup/Projekt
Make privacy/security‑by‑design the default. One command. Zero plaintext. Reach peace of mind.
What we're building: A developer‑first serverless platform (think Vercel/Netlify) where every byte stays end‑to‑end encrypted. Modules: noisybuffer (E2EE data store), noisychannel (ephemeral e2ee websoket streams), noisyproc (FHE compute via Lattigo & OpenFHE), noisytransfer (secure key import and instant e2ee file sharing from app to app), plus noisycli (Deno/TS/JS) for a one‑command deploy of a "non-private" web app. Post‑quantum (hybrid PQC) readiness baked in.
You can get the pitchdeck here: https://pitchload.net/startups/white-noise/documents
Herausforderungen
The team currently consists of only one person. Accordingly, the main focus is on the typical tasks of an early-stage project.Currently, the most important priority is:
- Gaining initial traction with a functional PaaS MVP. We are therefore looking for support in development.
Zielgruppe
Our “final” target group consists, on the one hand, of citizens as end users of our products, and on the other hand, of companies and self-employed individuals who process personal or otherwise sensitive data.As long as our services have not yet reached full maturity, we are initially focusing on user groups with a strong affinity for privacy and security.
Target groups with compliance requirements are currently not explicitly addressed, but they are not excluded either.