Trezor Safe 7 has landed. A new standard for crypto security. Pre-order now.

GET STARTED
WITH YOUR NEW TREZOR

Download the Trezor Suite app and follow the steps to get started.

This is how it works

1

Download Trezor Suite app

Download Trezor Suite app for desktop for the best experience, or click "Continue in browser" to open the web app.

The Trezor Suite is your gateway to managing your cryptocurrency portfolio with the highest level of security. Available for Windows, macOS, and Linux, the desktop application provides a seamless experience for both beginners and advanced users.

2

Install the app

Install the desktop app on your computer. This step isn't necessary for web app users.

The installation process is straightforward and takes just a few minutes. Once installed, you'll have access to all the powerful features of Trezor Suite, including portfolio tracking, transaction history, coin management, and advanced security settings.

3

Set up your Trezor

Plug in your device and follow the steps to set up your hardware wallet.

During setup, you'll create a new wallet or recover an existing one using your recovery seed. The device will generate a unique recovery seed consisting of 12 or 24 words that serves as your ultimate backup. Make sure to write this down on the provided recovery card and store it in a safe place. Never share your recovery seed with anyone or store it digitally.

4

Move your coins

You're ready to protect your crypto securely. Check our guide to learn how to transfer your assets from an exchange or another wallet.

Once your Trezor is set up, you can start receiving cryptocurrency. Simply select the coin you want to receive, copy your wallet address, and use it to withdraw from an exchange or transfer from another wallet. Your private keys never leave the device, ensuring maximum security.

Why Choose Trezor?

Unmatched Security

Trezor hardware wallets use state-of-the-art security features to protect your cryptocurrency. Your private keys are stored in an isolated environment within the device, completely offline and inaccessible to hackers. Even if your computer is compromised by malware, your funds remain safe.

With features like PIN protection, passphrase encryption, and Shamir Backup, you have multiple layers of security at your disposal. The device's secure chip is resistant to physical tampering, and firmware updates are cryptographically signed to prevent malicious modifications.

Support for 1000+ Coins

Manage your entire cryptocurrency portfolio in one place. Trezor supports over 1,000 different cryptocurrencies and tokens, including Bitcoin, Ethereum, Litecoin, and countless ERC-20 tokens. Whether you're a Bitcoin maximalist or a DeFi enthusiast, Trezor has you covered.

New coins and tokens are regularly added through firmware updates, ensuring that your Trezor remains compatible with the latest blockchain innovations. You can manage multiple accounts for each cryptocurrency and seamlessly switch between them within Trezor Suite.

Easy to Use

Despite its advanced security features, Trezor is designed to be user-friendly for everyone. The intuitive Trezor Suite interface guides you through every step, from initial setup to advanced features like coin control and transaction labeling.

The device's touchscreen (on select models) makes transaction verification simple and secure. Clear on-screen instructions ensure you always know what you're confirming. And if you ever need help, our comprehensive knowledge base and support team are always available.

Using Trezor

Trezor Onboarding

Get personalized help setting up your new Trezor device with our expert onboarding service.

Personal 1:1 guide for Trezor hardware wallet setup
60-minute live, online Trezor Expert Onboarding Session in English
Available for all Trezor hardware wallets

*It's necessary to have a Trezor device with you for this session.

Advanced Security Features

PIN Protection

Your Trezor device requires a PIN code to unlock. The PIN is entered using a randomized number pad displayed on your computer screen, while the actual layout is shown only on your Trezor device. This prevents keyloggers and screen capture malware from stealing your PIN.

After several unsuccessful PIN attempts, the device implements exponential delays, making brute-force attacks virtually impossible. You can set a PIN between 4 and 50 digits long for maximum security.

Passphrase Encryption

Add an extra word to your recovery seed to create hidden wallets. This optional 25th word (passphrase) provides plausible deniability - you can have multiple wallets on one device, each protected by a different passphrase.

Even if someone obtains your 24-word recovery seed, they cannot access your funds without the correct passphrase. This feature is perfect for advanced users who want the ultimate level of security.

Shamir Backup

Instead of a single 24-word recovery seed, Shamir Backup allows you to split your backup into multiple shares. You can specify how many shares are needed to recover your wallet (for example, 3 out of 5 shares).

This eliminates the single point of failure problem. You can distribute shares to trusted family members or store them in different locations. Even if one share is lost or stolen, your wallet remains secure and recoverable.

Open Source Firmware

Trezor's firmware is completely open source, meaning anyone can inspect the code for vulnerabilities or backdoors. This transparency is crucial for security - you don't have to trust us, you can verify the security yourself.

The global security community continuously audits our code, and we work with independent security researchers through our bug bounty program. Every firmware update is signed and verified to prevent malicious modifications.

Complete Setup Guide

Before You Begin

Before setting up your Trezor device, make sure you have everything you need:

  • Your Trezor hardware wallet (Model One or Model T)
  • USB cable (included in the box)
  • Computer with internet connection
  • Recovery seed card (included in the box)
  • Pen or pencil for writing down your recovery seed
  • A quiet, private space where you won't be disturbed or observed

Step-by-Step Setup Process

1. Unbox Your Trezor

Carefully unbox your Trezor device and check that the security seal is intact. If the seal is broken or missing, do not use the device and contact Trezor support immediately. Inside the box, you should find your Trezor device, USB cable, recovery seed cards, stickers, and a getting started guide.

2. Connect to Your Computer

Use the included USB cable to connect your Trezor to your computer. Make sure you're connecting to a trusted computer that you own and control. Avoid using public computers or devices that might be compromised. Once connected, visit trezor.io/start and download Trezor Suite.

3. Install Trezor Suite

Install the Trezor Suite application on your computer. The installation process varies depending on your operating system, but it's straightforward for all platforms. Once installed, launch the application. It will automatically detect your connected Trezor device and guide you through the setup process.

4. Create New Wallet or Recover

You'll be asked whether you want to create a new wallet or recover an existing one. If this is your first Trezor device, select "Create new wallet." If you're replacing a lost or damaged device, select "Recover wallet" and you'll be prompted to enter your recovery seed.

5. Create Your PIN

You'll be prompted to create a PIN code for your device. This PIN is required every time you want to use your Trezor. Choose a PIN that's secure but memorable. The PIN entry uses a randomized keypad for security - the actual layout is only shown on your Trezor's screen, preventing keyloggers from capturing it.

6. Write Down Your Recovery Seed

This is the most critical step. Your Trezor will display a series of 12 or 24 words - this is your recovery seed. Write these words down on the recovery seed card provided, in the exact order shown. Double and triple-check that you've written them correctly.

⚠️ IMPORTANT SECURITY WARNINGS:

  • • Never take a photo of your recovery seed
  • • Never store it digitally (no cloud storage, no password managers)
  • • Never share it with anyone, including Trezor support
  • • Store it in a safe, secure location
  • • Consider making multiple copies and storing them in different locations
  • • Anyone with access to your recovery seed can steal all your cryptocurrency

7. Verify Your Recovery Seed

Trezor Suite will ask you to verify your recovery seed by entering specific words. This ensures you've written down the correct seed. Take your time and verify carefully. If you make a mistake, you can start over.

8. Set Up Trezor Suite

Once your device is set up, you can configure Trezor Suite to your preferences. You can enable additional security features, customize your dashboard, add labels to your accounts, and enable coins you want to manage.

9. Receive Your First Cryptocurrency

To receive cryptocurrency, select the coin you want to receive in Trezor Suite and click "Receive." Your Trezor will display a receiving address on its screen. Verify that this address matches what's shown in Trezor Suite. Then you can use this address to receive funds from an exchange or another wallet.

10. Test with a Small Amount First

Before transferring large amounts of cryptocurrency, test your setup by sending a small amount first. Verify that you can receive it, view the balance in Trezor Suite, and that your Trezor can sign transactions correctly. Once you're confident everything works, you can transfer larger amounts.

Security Best Practices

Do This

  • Always verify receiving addresses on your Trezor screen before sending funds
  • Keep your Trezor firmware up to date with the latest security patches
  • Use a strong, unique PIN for your device
  • Store your recovery seed offline in a secure location
  • Double-check recipient addresses before confirming transactions
  • Only download Trezor Suite from the official website (trezor.io)
  • Consider using a passphrase for additional security on large holdings
  • Keep your computer and antivirus software up to date

Never Do This

  • Never share your recovery seed with anyone, even Trezor support
  • Never enter your recovery seed into any website or computer application
  • Never store your recovery seed digitally (photos, cloud storage, etc.)
  • Never buy a Trezor from third-party marketplaces or resellers
  • Never use a device if the security seal is broken or missing
  • Never ignore firmware update warnings in Trezor Suite
  • Never confirm a transaction without verifying details on your Trezor screen
  • Never leave your Trezor unattended while connected and unlocked

Frequently Asked Questions

What is a hardware wallet?

A hardware wallet is a physical device designed to securely store your cryptocurrency private keys offline. Unlike software wallets that store keys on your computer or phone (which are vulnerable to hacking), hardware wallets keep your keys isolated in a secure chip. This makes them one of the safest ways to store cryptocurrency.

What happens if I lose my Trezor?

If you lose your Trezor device, your cryptocurrency is not lost as long as you have your recovery seed. You can purchase a new Trezor, set it up, and use the "Recover wallet" option to restore access to all your funds using your recovery seed. This is why it's crucial to store your recovery seed safely.

Can my Trezor be hacked?

Trezor devices are designed to be extremely secure and resistant to various types of attacks. Your private keys never leave the device, and all sensitive operations are performed within the secure chip. Even if your computer is compromised with malware, your funds remain safe because the attacker cannot extract your private keys from the device. However, it's important to follow security best practices, such as verifying addresses on the device screen and keeping your recovery seed secure.

Do I need to keep my Trezor connected to use my cryptocurrency?

No, you only need to connect your Trezor when you want to send cryptocurrency or access certain features in Trezor Suite. You can check your balances, receive cryptocurrency, and view transaction history without the device connected. However, to sign and send transactions, you'll need to connect your Trezor to verify and authorize those actions.

How long does setup take?

The initial setup process typically takes 10-20 minutes. This includes installing Trezor Suite, creating your PIN, generating and writing down your recovery seed, and verifying the seed. We recommend not rushing through this process - take your time to ensure everything is done correctly, especially when writing down your recovery seed.

Is Trezor compatible with other wallets?

Yes, Trezor is compatible with many third-party wallet applications, including MetaMask, Electrum, and others. This allows you to use your Trezor for enhanced security while enjoying the features of your favorite wallet interfaces. Your Trezor acts as the secure key storage while the wallet application provides the user interface.

What's the difference between Trezor Model One and Model T?

Both models offer the same core security features, but the Model T includes a touchscreen for easier PIN entry and transaction confirmation, an SD card slot for additional security features, and supports more cryptocurrencies. The Model One uses buttons for navigation and requires PIN entry through the computer. Both are excellent choices depending on your needs and budget.

Ready to Secure Your Crypto?

Join millions of users worldwide who trust Trezor to keep their cryptocurrency safe.