The most trusted hardware wallet for storing Bitcoin, Ethereum, and thousands of other cryptocurrencies. Your private keys stay offline, protected from online threats.
Trezor hardware wallets have been securing cryptocurrency for over a decade. With industry-leading security features and user-friendly design, we make it easy to take control of your digital wealth.
Your private keys never leave the device. Trezor uses advanced cryptography and secure chip technology to protect your assets from hackers, malware, and physical theft. Every transaction requires manual confirmation on the device screen, ensuring no unauthorized access.
Designed for beginners and experts alike. Our intuitive Trezor Suite application guides you through every step, from setup to advanced portfolio management. Access your wallet from desktop or mobile, with seamless synchronization across all your devices.
Support for over 1,800 cryptocurrencies including Bitcoin, Ethereum, Litecoin, and all major altcoins. Compatible with popular third-party wallets and DeFi applications. Use Trezor with MetaMask, MyEtherWallet, and many more platforms.
Our firmware is completely open source, allowing security researchers and developers worldwide to audit and verify the code. This transparency ensures there are no backdoors or hidden vulnerabilities. The global community continuously reviews and improves Trezor's security.
We believe in full transparency. Every line of code, every security update, and every improvement is publicly available on GitHub. This commitment to openness has made Trezor the most trusted name in hardware wallet security.
Never worry about losing access to your funds. During setup, you'll receive a recovery seed - a list of 12 or 24 words that can restore your entire wallet. Keep this seed safe, and you can recover your wallet even if your Trezor device is lost, stolen, or damaged.
Advanced users can create multiple hidden wallets using passphrases, adding an extra layer of security. Shamir Backup allows you to split your recovery seed into multiple shares, requiring a threshold of shares to recover your wallet.
Understanding how Trezor protects your cryptocurrency is essential. Here's a detailed look at our multi-layered security approach.
Trezor operates as a "cold storage" device, meaning your private keys are generated and stored completely offline. Unlike software wallets or exchanges, your keys never touch an internet-connected device, eliminating the risk of remote hacking attempts.
When you need to make a transaction, the transaction details are sent to your Trezor, signed offline with your private key, and then the signed transaction is sent back to your computer to be broadcast to the blockchain. Your private key never leaves the device.
This air-gapped security model is the gold standard for cryptocurrency storage and is trusted by individual users, institutions, and enterprises worldwide.
Your Trezor is protected by a PIN that you set during initial setup. This PIN is required every time you connect your device, preventing unauthorized access even if someone steals your physical device. The PIN entry uses a randomized keypad displayed on your computer, while you enter the position on the Trezor screen.
After multiple incorrect PIN attempts, your Trezor enforces increasing wait times, making brute-force attacks virtually impossible. After enough failed attempts, the device wipes itself completely.
For advanced security, you can add a passphrase to your recovery seed. This creates a completely separate hidden wallet, providing plausible deniability. Even if someone forces you to unlock your Trezor, they'll only see the decoy wallet, not your hidden assets.
Every time you update your Trezor firmware or connect your device, it performs a cryptographic verification to ensure the firmware hasn't been tampered with. This protects against supply chain attacks and malicious firmware modifications.
Trezor uses a bootloader that verifies the digital signature of the firmware before loading it. Only firmware signed by SatoshiLabs' private keys can run on your device. If verification fails, the device refuses to boot and displays a warning.
Our firmware updates are released regularly to patch any discovered vulnerabilities and add new features. The open-source nature means security researchers worldwide are constantly auditing for potential issues.
Every transaction must be manually verified and confirmed on your Trezor's screen. This "what you see is what you sign" principle ensures that malware on your computer cannot modify transaction details without your knowledge.
The Trezor display shows the exact recipient address and amount being sent. You must physically press the button on the device to approve the transaction. This makes it impossible for malware to steal your funds even if your computer is completely compromised.
For smart contract interactions and DeFi applications, Trezor displays human-readable transaction details, helping you avoid signing malicious contracts that could drain your wallet.
Setting up your Trezor hardware wallet is simple and takes only a few minutes. Follow this comprehensive guide to secure your cryptocurrency.
Carefully unbox your Trezor and inspect the packaging for any signs of tampering. The box should have holographic seals intact. Inside, you'll find your Trezor device, USB cable, recovery seed cards, and a getting started guide.
Connect your Trezor to your computer using the provided USB cable. The device will power on automatically. Never use a Trezor that came with pre-installed firmware or a pre-filled recovery seed - these are scam devices.
Visit trezor.io/start and download Trezor Suite, our official desktop application. Trezor Suite is available for Windows, macOS, and Linux. You can also use the web version at suite.trezor.io.
Brand new Trezor devices come without firmware installed. This is a security feature that proves your device hasn't been tampered with during shipping. Trezor Suite will detect that firmware needs to be installed and guide you through the process.
Click "Install firmware" and follow the on-screen instructions. The installation takes a few minutes. Your Trezor will display progress on its screen. Don't disconnect your device during this process.
After installation, the firmware's cryptographic signature is verified. This ensures you're running authentic, unmodified firmware from SatoshiLabs. Once verified, your device will restart and be ready for setup.
Choose "Create new wallet" to generate a fresh recovery seed. Your Trezor will display either 12 or 24 words (depending on your model) on its screen. Write these words down on the provided recovery seed cards in the exact order shown.
This recovery seed is the master key to all your cryptocurrency. Anyone with access to your seed can recover and control your funds. Never take a photo of your seed, store it digitally, or share it with anyone. Store your recovery seed cards in a secure location, preferably in a fireproof safe.
After writing down all words, Trezor will ask you to verify by selecting the words in random positions. This ensures you've correctly recorded your recovery seed before proceeding.
Create a strong PIN between 4-50 digits long to protect your device. This PIN will be required every time you connect your Trezor. Choose a PIN that's memorable but not easily guessable (avoid birthdays, simple patterns, etc.).
The PIN entry system uses a randomized grid displayed on your computer screen, while you enter the position numbers on your Trezor. This prevents keyloggers and screen-recording malware from capturing your PIN.
You can change your PIN later in Trezor Suite settings. If you forget your PIN, you can wipe the device and recover your wallet using your recovery seed - your funds are never lost as long as you have your seed.
Now you're ready to add cryptocurrency accounts. In Trezor Suite, click "Add account" and select the cryptocurrency you want to receive. Each account has a unique receiving address generated from your recovery seed.
You can create multiple accounts for the same cryptocurrency, useful for organizing your funds. For example, you might have one Bitcoin account for savings and another for spending. All accounts are derived from your single recovery seed.
To receive cryptocurrency, click on an account and copy your receiving address. Always verify the full address on your Trezor's screen before sharing it. For large amounts, consider sending a small test transaction first to verify everything works correctly.
You're all set! To send cryptocurrency, select the account, click "Send," enter the recipient's address and amount. Trezor Suite will create the transaction and send it to your device for approval.
Carefully review all transaction details on your Trezor's screen: the recipient address, amount, and network fee. Only approve if everything is correct. If anything looks suspicious, reject the transaction and investigate.
Explore Trezor Suite's features: portfolio tracking, transaction history, buying cryptocurrency through integrated exchanges, and advanced settings. Enable labeling to add notes to transactions and addresses for better organization.
Find answers to common questions about Trezor hardware wallets.
Don't worry! As long as you have your recovery seed, you can restore your entire wallet on a new Trezor device or any compatible wallet. Your cryptocurrency is not stored on the device itself - it's on the blockchain. The Trezor just holds the keys to access it. Order a new device, select "Recover wallet" during setup, and enter your recovery seed to regain full access to your funds.
While no device is 100% unhackable, Trezor employs multiple layers of security that make it extremely difficult to compromise. Your private keys never leave the device, all firmware is cryptographically verified, and transactions require physical confirmation. The open-source nature means thousands of security researchers have audited the code. Any discovered vulnerabilities are quickly patched. For maximum security, use a strong PIN and consider adding a passphrase.
Both devices offer the same core security features. The Trezor Model T has a color touchscreen for easier navigation and PIN entry directly on the device, supports more cryptocurrencies including Cardano and Monero, includes a MicroSD card slot for additional encryption, and has a faster processor. The Trezor One is more affordable and uses physical buttons instead of a touchscreen. Both are excellent choices depending on your budget and needs.
No, you only need Trezor Suite when you want to manage your cryptocurrency. Your funds remain safe on the blockchain whether or not you're running the app. You can disconnect your Trezor and store it securely when not in use. Many users only connect their Trezor when they need to make transactions, keeping it offline the rest of the time for maximum security.
Yes! Trezor Suite is available as a mobile app for Android devices with USB OTG support. For iOS devices, you can use Trezor through compatible third-party wallets like MetaMask Mobile. Simply connect your Trezor using a USB-C or Lightning adapter. The mobile experience offers the same security as desktop, allowing you to manage your portfolio on the go.
Trezor Suite notifies you when new firmware is available. Updates are optional but recommended for security and new features. During an update, your device is temporarily wiped and then restored, so make sure you have your recovery seed before updating. The entire process takes a few minutes and is fully automated. Your funds remain safe throughout the update - they're on the blockchain, not in the device.
Absolutely! Trezor was designed with both beginners and experts in mind. The setup wizard guides you through every step with clear instructions. Trezor Suite's interface is intuitive and user-friendly. Our extensive documentation, video tutorials, and 24/7 customer support are always available to help. Many first-time cryptocurrency users choose Trezor as their entry point because it makes security simple and accessible.