Wallets
Core

Telestai Core Wallet Guide

The Telestai Core Wallet is the official full-node wallet for the Telestai blockchain. It provides advanced features, enhanced security, and full control over your funds. This guide explains the core wallet's functionality, setup, and usage.


Key Features

  • Full Node: Download and verify the entire blockchain, ensuring complete trustlessness and decentralization.
  • Enhanced Security: Private keys are stored locally, and no third-party access is required.
  • Advanced Features: Includes features like message signing, transaction tracking, and multi-signature wallet support.
  • Custom RPC: Ideal for developers and advanced users who want to integrate Telestai functionality into their applications.

Download and Installation

Step 1: Download the Core Wallet

Step 2: Install the Wallet

  • Follow the installation instructions for your OS:
    • Windows: Run the .exe installer and follow the prompts.
    • macOS: Open the .dmg file and drag the application to your Applications folder.
    • Linux: Extract the tarball and run the wallet using the command line.

Step 3: Initial Sync

  • The wallet requires a full blockchain sync. This may take several hours depending on your internet speed.
  • Ensure you have sufficient disk space (at least 5GB recommended for initial setup).

Sending and Receiving TLS

  • To Send: Go to the "Send" tab, enter the recipient's address and amount, and confirm.
  • To Receive: Use the "Receive" tab to generate a new receiving address.

Message Signing and Verification

  • Access the File > Sign Message option to sign messages with your wallet for authentication purposes.
  • Verify messages using File > Verify Message.

Security and Considerations

  • Full Control: The core wallet gives you full control of your funds but requires more maintenance and disk space.
  • Private Key Management: Keys are stored locally and never exposed to the internet, making it highly secure.
  • Longer Sync Times: Since it downloads the full blockchain, syncing can be resource-intensive.
  • Ideal Use Case: Recommended for advanced users, developers, or those seeking the highest level of security.

Support and Troubleshooting


Updates

Always download updates directly from the official releases page (opens in a new tab) to avoid malicious software.