1 Verify the official site
Open your browser and type https://trezor.io/start manually. Confirm the padlock icon (🔒) and exact domain to avoid phishing pages. Never follow random links from social media or unsolicited emails.
Card-style dashboard guide — step-by-step setup, security checklist, and troubleshooting for your Trezor hardware wallet.
Open your browser and type https://trezor.io/start manually. Confirm the padlock icon (🔒) and exact domain to avoid phishing pages. Never follow random links from social media or unsolicited emails.
Choose between Trezor Model T and Trezor One on the site. Selecting the correct model ensures you receive the right firmware, UI instructions, and device-specific tips during setup.
Click the official download link to get Trezor Suite (Windows, macOS, Linux). Suite is the desktop application that communicates with your device and provides transaction management, firmware updates, and account views.
Only download from suite.trezor.io or the link provided on trezor.io/start.
Run the installer package and open Trezor Suite. The app will detect your device when connected. On Windows, accept driver installation if prompted. Avoid running Suite as administrator unless required by OS policies.
Use the supplied USB cable and plug the Trezor directly into your computer — do not use untrusted USB hubs for the initial setup. The on-device display will show a welcome screen; follow prompts on both Suite and the device.
If requested, allow Trezor Suite to install the latest firmware. Firmware is signed and verified; it protects your device against tampering. Keep the device connected until the update completes — do not unplug mid-update.
Choose Create New Wallet if you're new, or Recover Wallet if you have an existing seed. The device will generate a recovery seed (12–24 words). Write the words down manually on the supplied recovery card — do not photograph or store them digitally.
Set a PIN to protect access to your device. Optionally enable a passphrase for an additional hidden wallet. The PIN entry and passphrase confirmation occur on-device to prevent interception by malware.
Trezor requires physical confirmation for each operation. Always verify recipient addresses and amounts shown on the device — this prevents man-in-the-middle attacks where software attempts to change transaction details.
After setup, use Trezor Suite to manage accounts. Regularly update firmware & Suite, keep backups secure, and follow safe computing practices (antivirus, OS updates, avoid public Wi-Fi for critical actions).
Beyond the core setup, here are practices that increase long-term security and usability:
Action | Why it matters |
---|---|
Firmware updates | Protects device from new vulnerabilities |
Seed backups | Only reliable recovery method for lost devices |
On-device confirmations | Prevents malware from forging transactions |