Quick Start
-This tutorial walks you through a complete workflow: creating an identity, building a tessera from files, verifying it, and exporting it.
-1. Initialize your identity
-First, set up your local identity and database:
-tes init
-
-Generated Ed25519 identity
-Database initialized
-Config written to /home/user/.tesseras/config.toml
-Tesseras initialized at /home/user/.tesseras
-
-This creates:
--
-
~/.tesseras/identity/— your Ed25519 keypair
-~/.tesseras/db/— SQLite database for indexing
-~/.tesseras/blobs/— storage for memory files
-~/.tesseras/config.toml— configuration file
-
2. Prepare your files
-Create a directory with the memories you want to preserve:
-mkdir my-memories
-cp ~/photos/family-dinner.jpg my-memories/
-cp ~/photos/garden.jpg my-memories/
-echo "A warm Sunday afternoon with the family." > my-memories/reflection.txt
-
-Supported formats: .jpg, .jpeg, .png (images), .wav (audio), .webm (video), .txt (text).
3. Preview with dry run
-See what would be included without creating anything:
-tes create my-memories --dry-run
-
-4. Create a tessera
-tes create my-memories --tags "family,sunday" --location "Home"
-
-The output includes the content hash — a 64-character hex string that uniquely identifies your tessera. Copy it for the next steps.
-5. List your tesseras
-tes list
-
-Hash Created Memories Size Visibility
-9f2c4a1b3e7d8f0c 2026-02-14 3 284 KB public
-
-6. Verify integrity
-Use the content hash to verify that all files are intact and the signature is valid:
-tes verify 9f2c4a1b3e7d8f0c...
-
-Tessera: 9f2c4a1b3e7d8f0c...
-Signature: VALID
- [OK] memories/a1b2c3/media.jpg
- [OK] memories/d4e5f6/media.jpg
- [OK] memories/g7h8i9/media.txt
-Verification: PASSED
-
-7. Export a self-contained copy
-Export the tessera to a directory that can be read without Tesseras:
-tes export 9f2c4a1b3e7d8f0c... ./backup
-
-Exported to ./backup/tessera-9f2c4a1b3e7d8f0c...
-
-8. Inspect the export
-The exported directory is fully self-contained:
-tessera-9f2c4a1b3e7d8f0c.../
-├── MANIFEST # Plain text index with checksums
-├── README.decode # How to read this tessera without software
-├── identity/
-│ ├── creator.pub.ed25519 # Your public key
-│ └── signature.ed25519.sig # Signature of the MANIFEST
-├── memories/
-│ ├── <hash>/
-│ │ ├── media.jpg # The photo
-│ │ ├── context.txt # Description in plain text
-│ │ └── meta.json # Structured metadata
-│ └── .../
-└── decode/
- ├── formats.txt # Explanation of all formats used
- ├── jpeg.txt # How to decode JPEG
- └── json.txt # How to decode JSON
-
-Everything a future reader needs to understand the contents is included in the directory itself — no Tesseras software required.
- -