βœ…

1.a.i. Verified Writers

Verified writers have the ability to publish directly to the HackerNoon site without going through our editorial team. They are honored on the HackerNoon platform with a green verified checkmark next to their username.

image

image

We give these writers the ability to bypass the second human rule, only because they’ve gone through our editorial process many times and have consistently written publishable and outstanding content. They have effectively gone through our second human rule countless times and have gained the trust of our editorial team.

Verified writers are longtime contributors, writers who have completed our Hackership program, or are alumni of our blogging fellowship.

Read Next:

⏱️
1.b. Time to Review

Table of Contents:

πŸ“—
1. Editing Protocol Overview
πŸ‘«
1.a. Second Human Rule
βœ…
1.a.i. Verified Writers
⏱️
1.b. Time to Review

⭐
2. Standards of Quality
πŸ†•
2.a. Originality Score
❓
2.b. 6 Ws Score
🀨
2.c. Objectivity in ranked listicles
πŸ”’
2.d. Unranked listicles
πŸ€›
2.e. Actionable advice

3. Red Flags
3. Red Flags
πŸ“Ί
3.a. Subject Matter
πŸ˜΅β€πŸ’«
3.a.i. Subject matter saturation
🀬
3.b. Plagiarism
🧐
3.c. Sources and Citations
πŸ’”
3.d. Formatting is bad or broken
😡
3.e. Grammar level: gibberish
🩳
3.f. Story is Too Short

πŸ”— 4. Backlink Rules & Guidelines

β›”
4.a. Backlink Limits
πŸ‘
4.b. Banklink quality and diversity
ℹ️
4.b.i. Diversity of sources
πŸ₯‚
4.b.ii. Internal linking
πŸ”„
4.b.iii. Changing links
πŸ“«
4.c. Reposting and Canonical Linking
🏬
4.c.i. Canonical links to company domain
πŸ“
4.c.ii. Canonical links to blog networks or social networks