Get live statistics and analysis of memo's profile on X / Twitter

surviving smh

467 following951 followers

The Achiever

Memo is a hardworking and goal-oriented coder who thrives on continuous learning and self-improvement. They embrace challenges head-on, as seen in their impressive progress on Leetcode and active involvement in coding communities. Despite a modest follower count, Memo's dedication and clear growth mindset set them apart as a rising star in the tech space.

Impressions
65.8k-4.3k
$12.34
Likes
2.2k102
77%
Retweets
23-2
1%
Replies
6087
21%
Bookmarks
422
1%

Top users who interacted with memo over the last 14 days

@SpideyVed

Life is not a Comic book panel

3 interactions
@ayshtwt

i write code

2 interactions
@coffee_0708

Trying to debug my life, open to work - web dev, UI/UX

2 interactions
@sudo_Slash

they say it's web-dev and leetcode...

1 interactions
@sammydotdb

21 || Coder

1 interactions
@the_ohmiiee

always curious

1 interactions
@king_of_thehell

🕵️ Spying on people who didn't follow me back.

1 interactions
@HustleWithParth

CP • ML • Web Dev

1 interactions
@dv_zsh

i love side quests 😄

1 interactions
@abhaypalway_11

20 | ᴡᴇʙ-ᴅᴇᴠᴇʟᴏᴘᴇʀ && ᴄᴘᴇʀ | ᴍᴀɴʜᴡᴀ ʀᴇᴀᴅᴇʀ

1 interactions
@ayushi_heree

TryingToFindAGoodBio

1 interactions
@Tawakkalah13_10

19 | Game Dev | still grinding to add something in bio

1 interactions
@yvsays

i like to cook and code | CSE | No dms

1 interactions
@zerion0

22 ,SDE he/him

1 interactions
@vedantdotrpm

20 • Full stack • ambassador @tembo • prev 1x startup intern • Open for paid roles/gig • I build & ship fast

1 interactions
@okbhaicool

21 | my tweets have no meaning to them

1 interactions
@dazz_dev69

Teaching myself to teach machines. Here for the code, the coffee, and the existential Ai crisis.

1 interactions
@lost_jz

Exploring what clicks, perfecting what matters. 19 | ug | Into tech

1 interactions
@Divyansh91565

19 | @codeforces pupil | @codechef 2⭐ 1590+ | @leetcode 1800+ | @atcoder 8 Kyu 400+ | nerd arc

1 interactions
@Sarabjeet___

22 | Web | space | f1

1 interactions

Memo’s so dedicated to coding, their laptop probably thinks it’s dating a sleep-deprived caffeine addict — but hey, at least bugs fear them more than their sleep schedule does!

Winning a hackathon and securing a coveted summer internship for 2026 showcase Memo’s tangible achievements beyond just tweet counts or follower numbers.

To master technical skills through consistent effort and meaningful challenges, ultimately building a reputation as a reliable and skilled coder who inspires peers to push their limits.

Memo values education through practical experience over rote assignments, believing in learning-by-doing. They hold perseverance and incremental progress in high regard, understanding that success is built one solved problem at a time. They are skeptical of negative social media cycles, preferring meaningful engagement and growth.

Highly motivated and disciplined with a strong commitment to problem-solving and skill acquisition. Memo’s ability to track progress and celebrate milestones fuels their momentum.

May sometimes get caught in the grind, risking burnout or feeling drained by social media dynamics, as reflected in their observation about people leaving X after a few months.

Memo should share more bite-sized coding tips and personal progress updates to build a relatable and engaged audience on X. Hosting quick coding challenges or sharing ‘aha’ moments can invite interaction and highlight their Achiever archetype without overwhelming followers.

Memo’s first real coding challenge came from a college teacher who replaced written assignments with solving linked list problems on Leetcode — talk about hands-on learning!

Top tweets of memo

the three terms encoding, encryption and hashing sounds pretty similar but they are used for completely different purposes. Encoding it is not about security at all. encoding is simply data representation, changing data from one format to another so that it can be easily transmitted or understood by another system. - it uses public algos that anyone can access - there is no secret key and its fully reversible - the main goal is usability and not secrecy eg - when you see a website url like : `https://www .google.com/search?q=hello%20world`, the space in "hello world" is encoded as %20. common encoding formats are: url encoding, ascii, unicode. Encryption - encryption involves security. in encryption, the readable data, i.e plain text, is converted into unreadable, i.e cipher text, using an encryption key. - only someone with the right key can decrypt it back to the original data. - it used for secure online transactions, encryption of files and msges. there are two main types: > symmetric encryption - same key for encryption and decryption (AES ) > asymmetric encryption - there are two keys, public and private ( RSA ) eg- when you send a msg on whatsapp, your msg is encrypted on your device, before it is sent. it can only be decrypted on your friend’s phone. Hashing hashing is a one way process used to check if the data has been altered. it is used for data integrity verification. - hashing transforms the input data of any size into a fixed length unique string i.e a hash. - once the data is hashed, the original input cannot be retrieved. - even a small change in input changes the hash output completely. eg - when you create an account and set a password, websites don't store your actual password. instead, they store the hash of it. when you log in it, the entered password is hashed again and if both hashes match, you are logged in.

5k

been learning some backend stuff lately, so wrote a brief about access and refresh tokens in jwt. what is jwt? JWT ( JSON Web Token ) is a compact, url-safe way to securely transmit information between parties as a json object. it's commonly used for authentication and information exchange in web applications. in jwt based authentication, access tokens and refresh tokens work together to manage user sessions securely. Access Tokens - an access token is a credential used to access protected resources on user's behalf. - it has a short lifespan ( few mins to hrs ) to reduce security risks. - access tokens are usually stored in memory ( non persistent storage ) to reduce security risks. - it contains info like the user's identity and permissions. - once it expires, the client must obtain a new access to continue accessing resources. Refresh Tokens - a refresh token allows the client to obtain a new access token when the current one expires. - it has a long lifespan, so should be stored securely, typically in an HttpOnly cookie. - HttpOnly cookies protect the token from being accessed by js, reducing the risk of XSS ( cross-site scripting ) attacks. - refresh tokens can be invalidated to log a user out or revoke their access when needed. below is how they work together : 1) User login - user enters their credentials ( username and pwd ). - server verifies them, issues access token and refresh token. 2) Application load - on load, the client checks if a valid access token exists in memory. - if none exists or it has expired, the client sends the refresh token to the server. - if the refresh token is valid, server issues a new access token. 3) Accessing resources - client sends the access token with requests via the `Authorization` header: Authorization : Bearer - server verifies the token and grants the access to protected resources. 4) Token expiry and refresh - when access token expires, requests will fail with an unauthorized error. - client sends the refresh token to server to get a new access token, which is then issued after validation. 5) Logout - if the refresh token in invalid or expired, the user is logged out. using access and refresh tokens this way keeps sessions secure and easy for the user. thanks for reading : )

7k

X premium ended, no more blue tick🥀 Thanks again @byteHumi for the giveaway, it was great till it lasted. Grew my account from 500 to almost 800 oomfs now in past 1 month. No more long rants now😔

3k

Most engaged tweets of memo

X premium ended, no more blue tick🥀 Thanks again @byteHumi for the giveaway, it was great till it lasted. Grew my account from 500 to almost 800 oomfs now in past 1 month. No more long rants now😔

3k

People with Achiever archetype

The Achiever

Co-Founder of Swol Lyfe™️ and @swollyfe $SWOL

8k following19k followers
The Achiever

I build good shit. Checkout lockdin.in

136 following81 followers
The Achiever

Be who you are, not who you’ve been. A forever student grateful for any wisdom or knowledge imparted upon me.

1k following135 followers
The Achiever

CTO at @Clipsource. Expert in streaming media & ads. Tech, food and wine lover.

3k following2k followers
The Achiever

19, I code

355 following352 followers
The Achiever

busy taking out the trash | yc x25

2k following919 followers
The Achiever

2017年进入币圈/老OG/合约赌徒//擅长超趋势交易/穿梭牛熊/币圈挖掘机/最好的交易所先入手 #binance 最值得投资 #btc #eth #sol #bnb 具有永恒的财富价值 |商务合作:TG: @circoux

1k following33k followers
The Achiever

17 • SWE • prev 2x startups • 1x 🏆global hack • fellow @solana & @base • polymath • building @AxonForMiners

2k following1k followers
The Achiever

dev | design | build - fail - learn - repeat | obsessed with anime, coffee, music, f1

451 following223 followers
The Achiever

Co-Founder @TraderLion_ @Deepvue • Co-Author Trader's Handbook • Swing Trader

790 following75k followers
The Achiever

Bea Girl...

6k following9k followers
The Achiever
294 following236 followers

Explore Related Archetypes

If you enjoy the achiever profiles, you might also like these personality types:

Supercharge your 𝕏 game,
Grow with SuperX!

Get Started for Free