1 Connect Your Trezor
Please connect your Trezor device to your computer using the provided USB cable. Ensure you are using the original cable that came in the box to prevent any connection issues. Once connected, your device's screen should light up, displaying a "Connect to trezor.io" message. If your device does not power on, please try a different USB port on your computer. Avoid using USB hubs or adapters if possible, as these can sometimes cause intermittent connection problems.
Your browser may ask for permission to connect to a USB device. Please approve this request. This is a necessary step for the web interface to communicate securely with your hardware wallet. We utilize WebUSB, a secure protocol that allows your browser to talk directly to the device without needing any additional bridge software or browser extensions. This enhances security and simplifies the setup process. If you do not see a prompt, please ensure your browser (such as Google Chrome or Brave) is up-to-date and supports WebUSB.
Browser Compatibility
This setup process requires a WebUSB-compatible browser. We recommend using the latest version of Google Chrome, Brave, or Microsoft Edge for the best experience. Firefox and Safari do not currently support this feature.
2 Install or Update Firmware
Your device may have shipped without firmware for security reasons, or it may require an update to the latest version. The firmware is the core software that runs on your Trezor device. Keeping it updated is crucial for accessing new features and ensuring you have the latest security patches. This page will automatically detect the status of your device.
If prompted, please confirm the firmware installation on your device's screen. You will be shown a "fingerprint" or "hash" of the firmware on both your computer screen and your device. It is critically important that you compare these two strings. They must match exactly. This verification ensures that you are installing genuine, unaltered firmware directly from SatoshiLabs. If the fingerprints do not match, DO NOT PROCEED and contact our support team immediately.
The installation process may take a few minutes. Do not disconnect your device or close this browser tab during the update. Your device will restart automatically once the installation is complete. This process is designed to be seamless, but it is vital for the integrity and security of your hardware wallet. Once the firmware is installed, the device is ready for the next step: wallet creation.
This will start the process of detecting your device.
3 Create Your New Wallet
Once your firmware is up to date, you will be prompted to create a new wallet. This process generates your unique "master seed," which is the key to all your cryptocurrency accounts. This generation happens entirely inside your Trezor device, meaning the seed is never exposed to your computer or the internet. This is the core principle of hardware wallet security. Your computer only coordinates the process, but the sensitive data generation and storage never leave the secure element of your Trezor.
You will be asked to confirm this action on your device. Simply press the "Confirm" button on your Trezor when prompted. The device will then display a message indicating that it is generating your new wallet. This process is instantaneous. After this, you will be immediately guided to the most important step of the entire setup: backing up your recovery seed. Do not skip the backup process under any circumstances.
4 Back Up Your Recovery Seed
This is the most critical step of the entire process. Your Trezor will now display a sequence of 12, 18, or 24 words. This is your Recovery Seed. Write these words down on the recovery seed card included in your Trezor box.
- Write each word clearly and in the correct order.
- Double-check the spelling of every single word.
- NEVER store your recovery seed digitally. Do not take a photo, do not type it into a text file, and do not save it in a password manager.
- Anyone who gains access to your recovery seed has FULL ACCESS to all your crypto assets.
Once you have written all the words down, your Trezor device will ask you to verify a few of them to ensure your backup is correct. After you have successfully verified your backup, store your recovery seed card in a secure, private, and durable location. Think of a place that is safe from fire, water, and theft. Many users opt for a home safe, a bank deposit box, or another secure, offline location. We recommend making a second copy and storing it in a separate, equally secure location. Your recovery seed is your only backup if your device is lost, stolen, or damaged.
SECURITY WARNING
Trezor staff or support will NEVER ask you for your recovery seed. Anyone asking for your seed is attempting to steal your funds. Do not share it with anyone, for any reason, ever.
5 Set Your Device PIN
Your PIN is your day-to-day protection against unauthorized physical access to your device. You will be prompted to set a new PIN. A scrambled 3x3 grid will appear on your computer screen, but the numbers corresponding to each position will only be shown on your Trezor's display. You will enter your desired PIN by clicking the numbers on your computer screen, referencing the layout shown on your device.
This method, known as a "blind matrix," ensures that even if your computer is compromised with a keylogger or screen-recording malware, the attacker cannot learn your PIN. Choose a strong, non-obvious PIN (6-9 digits is recommended). Avoid simple patterns like "1234" or your date of birth. You will be asked to enter the PIN a second time to confirm it.
6 Name Your Device
As a final step, you can give your Trezor a personalized name. This name will appear on the device screen when it is plugged in and in the Trezor Suite interface. This helps you easily identify your device, which is especially useful if you own more than one Trezor. This name is for convenience and can be anything you like. It is stored on the device itself and can be changed later from the device settings.
Security Best Practices
Your security is our priority. Please review these essential principles to keep your assets safe.
Seed Phrase is Sacred
Your 12/24-word recovery seed is your master key. Never share it, never digitize it, and never enter it into any website or software. Anyone who has your seed can steal your funds. Store it offline and securely.
Verify on Device
Always trust your Trezor's screen. Your device is the secure, isolated source of truth. Before confirming any transaction, always verify the recipient's address and the amount on your device's display.
Strong PIN & Passphrase
Use a strong, random PIN to protect your device from physical access. For advanced security, consider using a Passphrase (BIP39), which acts as a 25th word for your seed, creating entirely new hidden wallets.
Beware of Phishing
Scammers may create fake websites, emails, or support chats. Always double-check the URL (it should be trezor.io). We will never ask for your seed or PIN. Be skeptical of all unsolicited messages and offers.
Understanding Your Trezor
Your Trezor hardware wallet is a single-purpose computer designed to protect your private keys from the risks of an internet-connected computer. By keeping the keys offline within a secure element, you can sign transactions without ever exposing your sensitive information. When you wish to send cryptocurrency, you create the transaction in the Trezor Suite software (or another compatible wallet), but the final, critical step of signing the transaction happens inside your Trezor. You must physically press a button on the device to approve the transaction, which is then broadcast to the network. This "physical two-factor" authentication makes it impossible for a remote hacker to drain your funds.
The device itself is protected by a PIN. This PIN prevents someone who physically steals your device from accessing it. If an incorrect PIN is entered too many times, the device will wipe itself. This is not a cause for panic, as long as you have your recovery seed. You can simply acquire a new Trezor (or any other BIP39-compatible wallet), restore it using your 12/24-word seed, and you will regain full access to all your accounts and funds. This is the power of deterministic wallets: the seed is the wallet, and the device is just a secure key for accessing it. This architecture provides robust security against both remote (malware, hacking) and physical (theft, loss) threats.
Furthermore, the Trezor firmware is open-source. This means its code can be independently audited and verified by security researchers all over the world. This transparency is a core part of our security philosophy, as it allows for peer review and builds trust. You are not just trusting our company; you are trusting a community of experts who have vetted the code. We encourage all users to stay informed about firmware updates, as they often contain important security enhancements and support for new assets or features. You will be notified of new updates directly within the Trezor Suite application. Always ensure your update process is secure by verifying the firmware fingerprint on your device's screen, as described in the setup steps above. This confirms the authenticity of the update and protects against any potential man-in-the-middle attacks. Your vigilance, combined with our technology, creates a formidable defense for your digital assets.
Setup Complete?
Once you have completed all the steps, you can proceed to the Trezor Suite web interface to manage your assets.
Go to Trezor Suite