From f186b71ca51e83837db60de13322394bb5e6d348 Mon Sep 17 00:00:00 2001 From: murilo ijanc Date: Tue, 24 Mar 2026 21:41:06 -0300 Subject: Initial commit Import existing tesseras.net website content. --- book/en/index.html | 288 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 288 insertions(+) create mode 100644 book/en/index.html (limited to 'book/en/index.html') diff --git a/book/en/index.html b/book/en/index.html new file mode 100644 index 0000000..cfdd805 --- /dev/null +++ b/book/en/index.html @@ -0,0 +1,288 @@ + + + + + + Introduction - Tesseras User Guide + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+

Keyboard shortcuts

+
+

Press or to navigate between chapters

+

Press S or / to search in the book

+

Press ? to show this help

+

Press Esc to hide this help

+
+
+
+
+ + + + + + + + + + + + + +
+ +
+
+ + + + + + + +
+
+

Introduction

+

Tesseras is a peer-to-peer network for preserving human memories across millennia. Each person creates a tessera — a self-contained time capsule of memories (photos, audio, video, text) that survives independently of any software, company, or infrastructure.

+

What is a tessera?

+

The word tessera comes from the small tiles used to make mosaics in the ancient world. In Tesseras, each tessera is a collection of memories packaged into a format designed to be understood even thousands of years from now, without any special software.

+

A tessera contains:

+
    +
  • Memories — photos (JPEG), audio recordings (WAV), video (WebM), and text (plain UTF-8)
  • +
  • Metadata — when and where each memory was created, who it involves, and what it means
  • +
  • Identity — cryptographic signatures proving who created it
  • +
  • Decoding instructions — plain-text explanations of every format used, so future humans can read the contents
  • +
+

Core philosophy

+
    +
  • No company dependency — your memories are yours, stored locally and replicated across a peer-to-peer network
  • +
  • No format lock-in — every tessera includes instructions for decoding its contents
  • +
  • Availability over secrecy — public memories are not encrypted, because long-term accessibility matters more than hiding things
  • +
  • Minimal encryption — only private and sealed content is encrypted; everything else is open
  • +
  • Quantum-resistant — dual signatures (Ed25519 + ML-DSA) protect integrity even against future quantum computers
  • +
+

Current status: Phase 4

+

Tesseras has completed through Phase 4 — encryption and sealed tesseras. The project now covers local tessera management, networking, replication, a mobile app, and cryptographic privacy.

+

What’s available today:

+
    +
  • Identity generation (Ed25519 keypair with proof-of-work)
  • +
  • Tessera creation from local files
  • +
  • Content-addressed storage (BLAKE3 hashing)
  • +
  • Integrity verification and self-contained export
  • +
  • Full node daemon with QUIC transport
  • +
  • Peer discovery via Kademlia DHT
  • +
  • Tessera pointer publishing and lookup across the network
  • +
  • Reed-Solomon erasure coding with automatic fragment repair
  • +
  • Flutter mobile app with embedded Rust P2P node
  • +
  • Private tesseras — encrypted content only the owner can access
  • +
  • Sealed tesseras — time-locked content that opens after a specific date
  • +
  • Hybrid post-quantum encryption — X25519 + ML-KEM-768 key encapsulation
  • +
  • AES-256-GCM content encryption with AAD binding
  • +
+

Key concepts

+
+ + + + + + + + + + + + + + + + +
ConceptDescription
TesseraA self-contained time capsule of memories
MemoryA single item (photo, recording, video, or text) within a tessera
Content hashA BLAKE3 hash that uniquely identifies a tessera by its contents
VisibilityControls who can access a tessera: public, private, sealed, or circle
Sealed tesseraA time capsule that can only be opened after a specific date
MANIFESTA plain-text index listing every file in the tessera with its checksum
Memory typeCategorizes a memory: moment, reflection, daily, relation, or object
NodeA device running the Tesseras daemon, participating in the P2P network
DHTDistributed hash table — how nodes find tessera pointers without a central server
BootstrapThe process of joining the network by contacting known seed nodes
+
+ +
+ + +
+
+ + + +
+ + + + + + + + + + + + + + + + + + + + + + + + +
+ + -- cgit v1.2.3