Why use a hardware wallet?
Hardware wallets put private keys inside a dedicated device so signing operations happen on the device and never expose keys to your computer or the internet. This significantly reduces the most common attack vectors — malware, keyloggers, and malicious web pages — because an attacker cannot remotely extract keys or silently sign transactions without your physical confirmation on the device screen.
Key idea: the device is your single source of truth — always verify details on the Trezor screen before approving.
What you’ll find in the box
- Trezor device (Model One or Model T).
- USB cable and any adapters included by the manufacturer.
- Recovery seed card(s) for writing down your recovery phrase.
- Quick-start instructions and warranty/packaging.
Inspect packaging for tamper evidence. If the box looks opened or modified, stop and contact the vendor or support before using the device.
Quick setup — step by step
- Connect the device: Plug the Trezor into your computer using the supplied cable. Unlock the device and visit
trezor.io/start
or open Trezor Suite. - Install official software: Follow the official site’s prompts to use Trezor Suite (desktop/web). Only download software from official links — avoid third-party mirrors.
- Install firmware: New devices may require an official firmware install. Complete the firmware process in the official flow; do not use firmware from untrusted sources.
- Create new wallet or recover: Choose to create a new wallet (generate a new recovery seed) or recover an existing wallet. For a new wallet, write down every word of the seed exactly on the supplied recovery card — in order.
- Set a PIN: The device will prompt you to set a PIN. The PIN protects the device locally — do not store the PIN with your recovery seed.
- Verify seed: Complete the verification prompts to confirm you recorded the seed correctly. Do not skip verification.
Never: photograph or store the recovery seed digitally (screenshots, cloud, phone) — that creates a high-value target for attackers.
Recovery seed — backup & storage
The recovery seed is the most important secret. Anyone with it can restore your wallet on another device. Best practices:
- Write the seed legibly on the official recovery card or use a metal backup plate for durability.
- Keep at least two geographically separated backups (for example, a home safe and a bank safety deposit box).
- Do not store the seed in electronic form (no photos, no cloud, no password manager entry unless using strong encryption and you fully understand the risk).
- If the seed is ever exposed or you suspect compromise, create a new wallet and transfer funds immediately.
PIN, passphrase, and hidden wallets
The PIN prevents casual physical access to the device. Optionally, you may enable a passphrase to create a hidden wallet (sometimes called a 25th word). A passphrase improves security but increases responsibility: if you forget the passphrase, the hidden wallet is unrecoverable even with the seed.
If you enable passphrase protection, store the passphrase separately and securely from the recovery seed.
Daily use — sending & receiving safely
- Receiving: Generate a receive address in your wallet interface and always verify the same address on the Trezor screen before giving it to the sender.
- Sending: Create the transaction in your wallet, then review and confirm amount, fee, and destination on the device screen. Only approve if what the device displays matches your expectations.
- Fees: Choose appropriate fees for the network to avoid stuck transactions; many wallets offer fee presets or advanced controls.
The device display is the final arbiter — malicious software cannot alter what appears on the physical Trezor screen.
Software integrations & supported wallets
Trezor integrates with Trezor Suite and many third-party wallets and services that support hardware signing. When using third-party software, ensure it explicitly supports your Trezor model and always confirm transaction details on-device. Prefer official apps and well-known wallets with active maintenance.
Troubleshooting common issues
Device not detected
Try a different USB cable, test another USB port, disable interfering browser extensions, or use the desktop Trezor Suite. Rebooting the host machine sometimes resolves driver/USB issues.
Firmware update problems
Reconnect and retry the official firmware flow. If the device appears unresponsive after an update, follow Trezor’s official recovery instructions — do not use third-party tools.
Forgot PIN
If you forget your PIN, you must perform a factory reset and recover using your seed. If you do not have the seed, funds cannot be restored.
Lost or damaged seed
If your seed is lost but you still control an unlocked device, create a new wallet and transfer funds immediately. If both the device and seed are lost, funds are unrecoverable.
Advanced security considerations
- Air-gapped workflows: For maximum security you can use an air-gapped host for sensitive operations and transfer signed transactions by QR or USB slip depending on your setup.
- Use official firmware: Only accept firmware updates presented through official Trezor channels.
- Multiple backups & splitting: Consider advanced backup schemes (shamir backups / multisig) if you hold substantial value and understand the trade-offs.
FAQ
- Can I recover my wallet on a different device?
- Yes. Use the recovery seed on a compatible hardware wallet that supports the same standard. Always verify firmware and vendor trust.
- Should I use a passphrase?
- Passphrases add security and plausible deniability but increase recovery complexity. Use them only if you can securely store and remember the passphrase separately from the seed.
- What should I do if I suspect compromise?
- If you suspect the device or seed is compromised, create a new wallet with a new seed on a verified device and transfer funds immediately. Contact official support if you need assistance.