The app built for your Trezor

Manage your crypto with a fast, secure, and privacy-first companion app. Backup, send and receive, and track portfolios — all without exposing your private keys to the web.

Secure by design

Industry-grade protection and privacy-first features to keep your digital assets safe.

  • Air-gapped key storage

    Private keys never leave the device. Transactions are signed locally and cannot be tampered with by other software.

  • Recoverable seed phrase

    Easily back up your wallet with a human-readable recovery phrase and learn safe storage practices.

  • Open standards

    Interoperable with popular wallet applications and following open protocols for transparency.

  • Mobile-friendly dashboard

    Track balances, swaps, and staking opportunities from the companion application — without exposing secrets.

Discover your ideal device

Trezor Model One

Starter Edition

Compact, reliable and perfect for first-time hardware wallet users.

Trezor Model T

Advanced security

Extra protection and professional features for power users and long-term storage.

Trezor Safe 3

Portable

Minimal form-factor with full private-key isolation — for travel and daily use.

Getting started — a practical setup guide

Trezor Start Guide: Secure setup & best practices for your hardware wallet

A step-by-step walkthrough to set up your Trezor device safely, create a recoverable backup, and use the companion app to manage your crypto with confidence.

Introduction. Bringing a hardware wallet into active use is one of the most important steps any crypto holder can take to protect their assets. A hardware wallet isolates your private keys on a physical device so signing transactions never exposes the keys to the internet. This guide walks through the essential steps to unbox, initialize, secure, and routinely maintain a Trezor device.

Unboxing and initial checks. When you first open your Trezor package, check for intact seals and packaging. Even though supply chain tampering is rare, an intact seal gives confidence that the product wasn’t modified. Locate the quick-start card and any recovery materials provided. Keep the instruction leaflet nearby while you proceed.

Powering up and firmware verification. Power the device according to the included instructions. Most devices will display a welcome screen and prompt you to verify firmware. Always follow on-device firmware verification steps — if the device offers a fingerprint or hash to compare, use the companion app or the manufacturer’s verified web resource to confirm the firmware fingerprint matches. Never skip firmware verification; it ensures the device is running authentic, up-to-date code.

Creating your wallet and seed phrase. During initialization the device will generate a recovery seed — a sequence of 12, 18, or 24 words. Write these words down on the provided recovery card (or a metal backup if you prefer durability). Never store the seed on a phone, cloud drive, or photo. The seed is the single point of failure for wallet recovery: anyone who gains access to it can recover funds. Make sure to write the words in order, double-check spelling, and store the backup in a secure location (for example, a home safe or other physically secure place). Consider creating multiple geographically separated backups for long-term resilience.

Choosing a PIN and passphrase options. The device will ask you to pick a PIN code. Choose something memorable but not trivially guessable. Many users opt to enable an optional passphrase in addition to the seed — a passphrase is an extra word or phrase that modifies your wallet seed, creating a distinct hidden wallet. Use a passphrase only if you understand the implications: it provides plausible deniability and extra security, but forgetting it means losing access to those funds permanently.

Connecting the companion app. The Trezor companion app provides a friendly interface to view balances, receive tokens, and construct transactions. When pairing, ensure the app you downloaded is the official companion app from verified sources. The pairing process typically involves scanning a QR code or confirming a short code on both the device and the app. Pairing does not transfer private keys or expose the seed — it only establishes a secure channel for viewing and signing transactions.

Best practices for everyday use. When sending funds, always verify the destination address shown on the device itself — not only the app. This is the final check that prevents address-manipulation attacks. Keep your device firmware updated, but verify updates via the companion app and official documentation. Use small test transactions when interacting with new services or smart contracts. Maintain a minimal online footprint for important recovery information; treat the recovery phrase like cash.

Long-term backups & storage tips. For long-term storage, consider a durable metal backup that resists fire, water, or corrosion. Store copies in separate, secure locations. Keep an inventory of where backups are stored, and refresh any paper backups periodically if ink or material degrades. Consider legal arrangements — like a secure will or trusted custodian instructions — so heirs can access recovery information in the event of incapacity.

When things go wrong. If you misplace your device, your funds are still recoverable using your seed on another compatible hardware wallet — but only if that seed was saved correctly. If your device shows signs of tampering or unexpected prompts, stop and contact official support channels listed in the official documentation — do not enter your seed or passphrase into unknown sites or forms.

Conclusion. A hardware wallet is a practical combination of technology and responsibility. By verifying firmware, securely storing your recovery phrase, using strong PINs and optional passphrases, and validating destination addresses on-device, you significantly reduce the risk of loss or theft. With these precautions, Trezor becomes a simple and powerful tool to keep your crypto secure for years to come.