Welcome to Trezor.io/Start
Your single, trusted source for initiating your hardware wallet. Follow these secure, step-by-step instructions to take self-custody of your digital wealth.
Launch Trezor Suite NowThe 5 Essential Steps for Your Secure Setup
Pre-Setup & Tamper Check
Before connecting, meticulously inspect the packaging for any sign of tampering. Verify all seals (like the hologram or tape) are intact. Then, download and install the official Trezor Suite app from our official site.
Install Verified Firmware
Your new device ships without firmware. Connect it, and Trezor Suite will prompt you. Only install the firmware provided directly through the Suite. This guarantees the code is verified and cryptographically signed by SatoshiLabs, the creators of Trezor.
Set Secure PIN
Set a strong PIN (4-9 digits recommended) on your device. For extra security, the PIN entry layout is randomized on the computer screen or device every time. Never enter your PIN directly into the computer—only ever follow the randomized grid as displayed on the device itself.
Record Wallet Backup
This is your master key. Your device will display your 12- or 24-word **Wallet Backup (Recovery Seed)**. Write it down *only* on the provided recovery cards. Store these cards in multiple, physically secure, offline locations. **NEVER** digitize this phrase.
Finalize & Fund
Name your device for easy identification within Trezor Suite. Once confirmed, you can begin generating receive addresses. Always verify the receive address shown on your computer screen against the one displayed on your Trezor device before confirming a transaction.
Security Principles: E-E-A-T for Your Crypto
Trezor operates on the highest standards of Expertise, Experience, Authoritativeness, and Trustworthiness. True self-custody requires you to understand why these principles matter, especially during the initial setup.
Verified Open-Source Code
Both the hardware and the firmware are **stubbornly open-source**. This allows security researchers, cryptographers, and the entire community to audit the code constantly, verifying its integrity and identifying vulnerabilities long before any malicious entity could exploit them.
The Power of Passphrase
The Passphrase feature (Hidden Wallet) is often referred to as the "25th word." Even if a sophisticated attacker compromises your physical Recovery Seed, they cannot access your funds without this final, memorable (but never written down) layer of protection.
Physical Integrity Check
Every genuine Trezor device uses physical security measures—like ultrasonic welds or tamper-evident seals—to ensure the device has not been intercepted or modified during shipping. Always perform this physical check as Step 1 to confirm your device's Authority.