Trezor.io/Start — Official Setup Guide

Your step-by-step on-boarding for Trezor hardware wallets: installation, initialization, safety checklist, and day-to-day usage.

Start secure — protect your crypto the right way

This guide walks you through every stage of getting your Trezor hardware wallet ready for use. Whether you own a Trezor One or Trezor Model T, the goal is the same: keep private keys offline and under your control, while using a trusted interface to manage accounts and sign transactions. Follow these steps carefully — hardware wallet security depends on process as much as on technology.

Before you begin
  • Find a quiet, private space to set up your device.
  • Use a computer you trust and avoid public or shared machines.
  • Have a pen and the included recovery card (or paper) ready for writing your seed.

Why a hardware wallet?

Compared to software wallets, a hardware wallet protects the cryptographic keys in a device that isolates signing from the internet-connected host. Even if your computer is compromised, attackers cannot sign transactions without the device and your approval. A hardware wallet is the foundation for secure long-term custody and responsible self-custody.

Key benefits

  • Private keys never leave the device
  • Physical confirmation required for every operation
  • Recoverable via recovery seed

Common uses

  • Long-term coin storage
  • Regular transactions with higher security
  • Multi-account management and token control

Download & install

Always download Trezor Suite and related installers from official sources. Verify the URL and, when available, check digital signatures or checksums. Avoid third-party mirrors and do not install software from links in unsolicited messages.

Step-by-step

  1. Select your OS: Windows, macOS, or Linux. Choose the appropriate installer.
  2. Run the installer: Follow standard installation prompts. On macOS you may need to allow the app in Security & Privacy.
  3. Open Trezor Suite: Launch the app and choose “Get started” to begin device initialization.

Initialize your Trezor — create a new wallet

Connect & verify

Connect your device to the computer using the supplied cable. Trezor Suite will detect the device and guide you through firmware verification or installation if needed. Always allow firmware updates prompted by Suite and confirm updates on the device display.

Create PIN

Choose a PIN for the device when prompted. The PIN prevents unauthorized local use of the hardware. The PIN is entered on the host but protected by the device; on Trezor Model T the touch screen can be used to enter a PIN more securely.

Write your recovery seed

The device will generate a recovery seed (typically 12, 18, or 24 words depending on model and options). Write the words down in order on the provided card or another secure medium. Do not photograph the seed, store it electronically, or share it with anyone. This seed is the ultimate backup that unlocks your funds if the device is lost or damaged.

Passphrase (optional)

An optional passphrase acts as a 25th word and creates a hidden wallet. A passphrase provides a strong extra layer of privacy and security, but it is also an irreversible secret — losing the passphrase means losing access to any accounts protected by it. Only use passphrases if you understand the operational risks and have reliable backups.

Add accounts & manage assets

After initializing the device, you can add cryptocurrency accounts through Trezor Suite. Suite supports Bitcoin, Ethereum, many altcoins, and ERC-20 tokens. Use labels for accounts to differentiate between purposes (e.g., Savings, Trading, Cold Storage).

Receiving funds

Generate a receive address in Suite. Always verify the address on the device screen before sharing it with a sender. Verifying on-device prevents address substitution attacks from host malware.

Sending funds

Compose a transaction in Suite and review the summary. The device will display destination addresses, amounts, and fees for your confirmation. Only approve transactions you recognize.

Security best practices

Core recommendations
  • Never enter your recovery seed into a computer or phone.
  • Store the recovery seed offline and in multiple secure physical locations if needed.
  • Verify device firmware and install updates only from official sources.
  • Use a strong PIN and consider passphrase protection if you can manage it safely.
  • Be cautious of phishing sites — always confirm you are on the official domain before connecting.

If someone gains access to both your recovery seed and any passphrase you use, they can control your funds. Treat backups with the same care you would physical valuables.

Troubleshooting & support

Common issues

  • Device not detected: try a different cable or USB port, restart Suite, and check Bridge (if used).
  • Firmware install failed: retry and ensure you downloaded Suite from the Official Site.
  • PIN forgotten: recovery seed required to restore to a new device.

When to contact support

If you suspect tampering, a lost seed, or unexplained behavior, contact official support channels. Provide logs only through official support forms and avoid sharing sensitive data publicly.

Frequently asked questions

Can I restore my wallet on another device?

Yes. Use your recovery seed to restore on a new Trezor or compatible wallet. Always verify the destination device before entering your seed.

Is the seed the same as a private key?

The recovery seed deterministically recreates the wallet's private keys. Protect the seed as you would any private key material.

What happens if my device is lost or destroyed?

Your funds can be recovered using the recovery seed on a replacement device. If you lose both the device and the seed, the funds are unrecoverable.

Can I use multiple Trezor devices with the same seed?

Yes. Restoring the same seed to multiple devices recreates identical wallets — useful for redundancy, but manage exposure carefully.