Trezor Start

Begin your secure journey with your hardware wallet — setup, backup and best practices in minutes.

Secure your crypto — offline, private, owned

Trezor gives you a simple, transparent way to store private keys offline so only you control your funds. This page walks you through safe setup, recovering a wallet, and everyday usage tips.

1
Unbox & connect
Unpack your device, connect it to your computer using the supplied cable, and visit the official start page.
2
Follow the on-device prompts
Set a PIN, write down your recovery seed, and verify the recovery words shown on the device — never share them.
3
Install compatible software
Use official apps to manage transactions. Always verify the website URL and only download from trusted sources.
Learn how it works

Quick checklist

  • Confirm package seal
  • Create and store seed offline
  • Set a strong PIN
  • Keep firmware up to date

Core concepts & features

Cold storage

Your private keys never leave the device. Signing happens on-device so online malware cannot expose keys.

Seed backup

A 12–24 word recovery phrase is the only backup you need. Store it offline in a secure place and never photograph it.

Open firmware & transparency

Device firmware and design choices prioritize auditability and user control.

Multi-currency support

Manage Bitcoin, Ethereum, numerous altcoins and NFTs using official and compatible third-party apps.

Everyday best practices

  • Always verify the device screen before approving a transaction.
  • Use a strong PIN and enable passphrase protection for extra security when needed.
  • Keep firmware up to date using the official updater to patch security improvements.
  • Prefer hardware wallets for long-term holdings; use smaller hot wallets for frequent spending.

Frequently asked questions

What if I lose my Trezor?

If you lose the device, your funds are still recoverable using your recovery seed on another compatible device. Keep the seed safe and offline.

Can Trezor be hacked remotely?

Because private keys are kept offline and signing occurs on-device, remote theft of keys is extremely difficult. Beware phishing, fake websites, and social engineering attempts.

How do I update firmware?

Use the official firmware update tool. Only apply firmware signed by the vendor and follow on-screen verification steps.