Verify integrity of a stored tessera.
tes verify <HASH>
| Argument | Description |
<HASH> | Tessera content hash (64 hex characters) |
| Option | Description |
--data-dir <PATH> | Base directory for data storage (default: ~/.tesseras) |
- Signature validity — verifies the Ed25519 signature over the MANIFEST
- File integrity — recomputes the BLAKE3 hash of every file and compares it against the MANIFEST
| Code | Meaning |
0 | Verification passed — all files intact, signature valid |
1 | Verification failed — corrupted files or invalid signature |
tes verify 9f2c4a1b3e7d8f0cabc123def456789012345678abcdef0123456789abcdef01
Tessera: 9f2c4a1b3e7d8f0cabc123def456789012345678abcdef0123456789abcdef01
Signature: VALID
[OK] memories/a1b2c3d4/media.jpg
[OK] memories/e5f6a7b8/media.txt
[OK] memories/c9d0e1f2/media.wav
Verification: PASSED
If a file has been modified or corrupted:
Tessera: 9f2c4a1b3e7d8f0cabc123def456789012345678abcdef0123456789abcdef01
Signature: VALID
[OK] memories/a1b2c3d4/media.jpg
[FAILED] memories/e5f6a7b8/media.txt
[OK] memories/c9d0e1f2/media.wav
Verification: FAILED
- Routine integrity checks — periodically verify that your stored tesseras haven’t been corrupted
- After transfer — verify after copying tesseras to a new device or storage medium
- Trust verification — confirm that a tessera received from someone else hasn’t been tampered with