


Teslim Sadiq
909 posts

@teslimcodes
Software Engineer || 9x Hackathon Winner || Founder @GPAihq || Mechanical Engineering @UnilagNigeria ||







Would you believe that for 9 weeks, Moniepoint has been training young engineering graduates at a bootcamp and was even PAYING them monthly while at it? Cohort 2 of Moniepoint DreamDevs Bootcamp wraps up weeks of serious software engineering and hits Demo Day on May 26 in Ikeja. We hear Cohort 1 grads are already on the Moniepoint engineering team. #MoniepointDreamDevs2

Ladies and gentlemen! 🔥 Say hello to our Heirs Insurance Hackathon 2026 Champions! 🏆



Everyone wants to win 🤲🏾

Where is the Jumia you guys said you'd rebuild in 2 weeks???? 🤡 This is the last day. I need a written apology not less than 500 words from all of you who insulted me for saying it's impossible. 😂




Track 1 Winners Announcement of the Sui Creator Program First off, huge thank you to everyone who participated in Track 1. The quality of submissions across the board was genuinely impressive and it was great seeing creators experiment with different storytelling formats across DeepBook, Hashi, and broader Sui Defi narratives. We saw everything from creative skits, educational breakdowns, polished explainers, AI-assisted content, and even documentary-style storytelling. Everyone brought strong effort, and narrowing this down was not easy. Submissions were reviewed based on: Hook strength Narrative clarity Originality Production quality Ecosystem value Topic diversity Accuracy/technical understanding Without further ado, The winners are: 1st Place @Whakee $1,500 Topic: DeepBook Most creative submission in the cohort Unique courtroom-style storytelling format Strong hook and highly memorable delivery 2nd Place @anurag__kochar $1,000 Topic: DeepBook Strong institutional-style storytelling Excellent macro framing around DeFi infrastructure issues High ecosystem repost potential 3rd Place @sheisTobi_ $500 Topic: Hashi Strong educational breakdown Clear explanation flow Helped diversify winning narratives beyond DeepBook Honorable Mentions @thegck Strong production quality and polished editing. @ZibahTheCreator Strong educational breakdown on Hashi. @jobiak1_ Solid execution with strong fundamentals. @0xTinaa06 Creative use of animated clips to explain DeepBook in a fun way. Special HM: @Silverhard High-effort documentary-style submission with strong research depth. While impressive, it felt better suited for broader ecosystem milestone storytelling and was submitted after the deadline. Again, thank you to everyone who participated, there were genuinely strong entries across the board and we’re excited about the creator talent emerging from this program. Track 2 details will be shared soon. Stay tuned 👀





DAY 8 OF MY BACKEND JOURNEY Password Hashing and Security with bcryptjs Today, I deepened my understanding of one of the most critical aspects of backend development: protecting user passwords. I learned that plain-text passwords are inexcusable, and even fast hashing algorithms like MD5 or SHA-1 leave systems vulnerable to brute-force and rainbow-table attacks. Learning with @Nannoyapp ● I discovered why adaptive hashing algorithms like bcryptjs are the industry standard. Unlike fast hashes, bcryptjs has a configurable cost factor (salt rounds) that can be increased as hardware improves, making it future-proof against computational advances. ● I learned the registration flow: hash the incoming password with bcrypt.hash() using at least 10 salt rounds before storing it in the database, ensuring that even if breached, attackers see hashes, not passwords. ● I understood the login verification process: use bcrypt.compare() to check if the plain-text password matches the stored hash. This function is timing-safe, preventing side-channel attacks where response time could leak information about where strings differ. ● I implemented proper error handling by returning a generic "Invalid credentials" message for both missing usernames and wrong passwords, refusing to reveal which one failed, a security best practice that prevents username enumeration attacks. ● I learned that salt rounds matter: 10 rounds takes ~65ms and is the production minimum, while 12 rounds (~250ms) is recommended for 2026. Benchmarking on production hardware is essential to balance security and user experience. OMO! I faced infrastructure challenges today🤦♀️: power supply issues disrupted my session. I installed Postman to test my endpoints oo, but it wasn't responding. So I switched to curl commands in the terminal to verify my hashing and login flows, but my PC went off right when I was about to run the tests. Frustrating timing, but the knowledge stuck with me. The journey continues, sometimes the hardest part isn't the code, it's fighting the hardware! 😭 Good evening everyone!



Added a music section. *Heavily inspired by @ayomicoder & @akinkunmi.