Quick Start
This tutorial walks you through a complete workflow: creating an identity, building a tessera from files, verifying it, and exporting it.
1. Initialize your identity
First, set up your local identity and database:
tes init
Generated Ed25519 identity
Database initialized
Config written to /home/user/.tesseras/config.toml
Tesseras initialized at /home/user/.tesseras
This creates:
~/.tesseras/identity/— your Ed25519 keypair~/.tesseras/db/— SQLite database for indexing~/.tesseras/blobs/— storage for memory files~/.tesseras/config.toml— configuration file
2. Prepare your files
Create a directory with the memories you want to preserve:
mkdir my-memories
cp ~/photos/family-dinner.jpg my-memories/
cp ~/photos/garden.jpg my-memories/
echo "A warm Sunday afternoon with the family." > my-memories/reflection.txt
Supported formats: .jpg, .jpeg, .png (images), .wav (audio), .webm (video), .txt (text).
3. Preview with dry run
See what would be included without creating anything:
tes create my-memories --dry-run
4. Create a tessera
tes create my-memories --tags "family,sunday" --location "Home"
The output includes the content hash — a 64-character hex string that uniquely identifies your tessera. Copy it for the next steps.
5. List your tesseras
tes list
Hash Created Memories Size Visibility
9f2c4a1b3e7d8f0c 2026-02-14 3 284 KB public
6. Verify integrity
Use the content hash to verify that all files are intact and the signature is valid:
tes verify 9f2c4a1b3e7d8f0c...
Tessera: 9f2c4a1b3e7d8f0c...
Signature: VALID
[OK] memories/a1b2c3/media.jpg
[OK] memories/d4e5f6/media.jpg
[OK] memories/g7h8i9/media.txt
Verification: PASSED
7. Export a self-contained copy
Export the tessera to a directory that can be read without Tesseras:
tes export 9f2c4a1b3e7d8f0c... ./backup
Exported to ./backup/tessera-9f2c4a1b3e7d8f0c...
8. Inspect the export
The exported directory is fully self-contained:
tessera-9f2c4a1b3e7d8f0c.../
├── MANIFEST # Plain text index with checksums
├── README.decode # How to read this tessera without software
├── identity/
│ ├── creator.pub.ed25519 # Your public key
│ └── signature.ed25519.sig # Signature of the MANIFEST
├── memories/
│ ├── <hash>/
│ │ ├── media.jpg # The photo
│ │ ├── context.txt # Description in plain text
│ │ └── meta.json # Structured metadata
│ └── .../
└── decode/
├── formats.txt # Explanation of all formats used
├── jpeg.txt # How to decode JPEG
└── json.txt # How to decode JSON
Everything a future reader needs to understand the contents is included in the directory itself — no Tesseras software required.