What is a Trezor® Hardware Wallet?

Trezor® is the world's first cryptocurrency hardware wallet, developed by SatoshiLabs in 2014. Unlike software wallets that store private keys on internet-connected devices, Trezor® keeps your cryptographic keys securely isolated on a dedicated hardware device. This approach provides "cold storage" security, meaning your private keys never leave the device and are never exposed to potentially compromised computers or online threats.

Key Security Features

Offline Key Storage

Private keys are generated and stored entirely on the device, never touching internet-connected systems.

PIN Protection

Device access is protected by a PIN entered directly on the device, preventing unauthorized physical access.

Recovery Seed

24-word recovery phrase allows wallet restoration if the device is lost or damaged.

Passphrase Protection

Optional passphrase creates a hidden wallet for additional security through plausible deniability.

Security Note: Trezor® devices are designed to be tamper-proof. If you receive a device that appears to have been opened or tampered with, do not use it and contact Trezor® support immediately.

Setting Up Your Trezor® Hardware Wallet

1

Download Trezor Suite

Visit the official Trezor® website and download Trezor Suite for your operating system (Windows, macOS, or Linux). Trezor Suite is the official interface for managing your device and cryptocurrencies.

2

Connect Your Device

Connect your Trezor® hardware wallet to your computer using the provided USB cable. If prompted, install Trezor Bridge—a communication tool that enables your browser to interact with the hardware wallet.

3

Initialize Your Device

Follow the setup wizard at trezor.io/start to initialize your device. You'll set up a PIN code and generate your recovery seed phrase—the most critical security step.

4

Secure Your Recovery Seed

Write down the 24-word recovery seed on the provided card and store it in a secure location. Never digitize this seed or store it online. This seed is your ultimate backup if your device is lost or damaged.

Frequently Asked Questions

How does Trezor® login work?

Trezor® login doesn't use traditional username/password credentials. Instead, you connect your physical device, enter your PIN directly on the Trezor® device, and confirm transactions physically. This ensures that even if your computer is compromised, your assets remain secure.

What is the difference between Trezor Suite and Trezor Wallet?

Trezor Suite is the next-generation interface that replaced the older Trezor Wallet web interface. It offers enhanced security, better user experience, additional features, and both desktop and web versions. Trezor Wallet (wallet.trezor.io) is the legacy interface.

Do I need Trezor Bridge for Trezor Suite?

The desktop version of Trezor Suite communicates directly with your Trezor® device without requiring Trezor Bridge. However, if you use the web version of Trezor Suite (suite.trezor.io/web), you will need to install Trezor Bridge for device communication.

Can I use Trezor Suite on mobile devices?

While there isn't a dedicated Trezor Suite mobile app, the web version of Trezor Suite is mobile-friendly. For the best mobile experience with Trezor®, consider using third-party mobile wallets that support Trezor® integration, such as Exodus.

What cryptocurrencies does Trezor® support?

Trezor® hardware wallets support over 1,000 cryptocurrencies including Bitcoin, Ethereum, Litecoin, Dash, Zcash, and all ERC-20 tokens. The device receives regular firmware updates that often add support for new cryptocurrencies.

What should I do if my Trezor® device is lost or stolen?

If your Trezor® device is lost or stolen, your funds remain secure as long as your PIN wasn't compromised. Simply acquire a new Trezor® device (or any compatible hardware wallet) and restore your wallet using your 24-word recovery seed phrase.