Welcome to the official Trezor setup guide. Follow these simple steps to securely set up your new Trezor hardware wallet and protect your cryptocurrency assets.
Begin Setup Watch Video GuideCarefully unbox your Trezor hardware wallet and verify that all components are present. Your package should include the Trezor device, USB cable, recovery seed cards, and lanyard. Check the holographic seal on the device to ensure it hasn't been tampered with.
Never purchase a used Trezor device. Always buy from official retailers to ensure your device hasn't been compromised. If the holographic seal is broken, do not use the device and contact Trezor support immediately.
Connect your Trezor device to your computer using the provided USB cable. Visit trezor.io/start in your web browser, which will automatically detect your device and guide you through the setup process. Make sure you have the latest version of Trezor Bridge installed for optimal connectivity.
The Trezor Suite interface will welcome you and begin the initialization process. Follow the on-screen instructions to proceed with setting up your new hardware wallet.
Your Trezor device will prompt you to install the latest firmware. This crucial step ensures your device has the most recent security updates and features. The installation process may take a few minutes - do not disconnect your device during this time.
After firmware installation, choose whether to create a new wallet or restore an existing one from a recovery seed. For new users, select "Create new wallet" to begin the setup process.
Your Trezor device will generate a unique 12, 18, or 24-word recovery seed. This is the most important security feature of your hardware wallet. Write down each word in the exact order shown on your Trezor display using the provided recovery seed cards.
Never digitize your recovery seed - no photos, no cloud storage, no typing into any device. Store multiple copies in secure physical locations. Anyone with access to your recovery seed can access your cryptocurrency funds.
Your Trezor will ask you to re-enter several words from your recovery seed to verify you've recorded it correctly. This ensures you have a proper backup. After verification, set up a secure PIN code that will be required every time you connect your Trezor device.
The PIN adds an extra layer of security, protecting your device even if it's physically stolen. Choose a PIN that's difficult to guess but memorable to you.
Once setup is complete, explore the Trezor Suite interface. You can now receive cryptocurrency by generating receiving addresses, view your portfolio balance, access third-party services through the Trezor Suite, and customize your device settings.
Familiarize yourself with the security features, transaction signing process, and portfolio tracking capabilities of your new secure hardware wallet.
Store your recovery seed in multiple secure physical locations. Consider using a fireproof safe or safety deposit box. Never store digital copies of your seed phrase.
Always keep your Trezor firmware updated to the latest version. Updates include critical security patches and new features that protect your cryptocurrency assets.
Always verify receiving addresses on your Trezor device screen before sending cryptocurrency. This protects against malware that might alter addresses displayed on your computer.
For advanced security, enable the passphrase feature to create hidden wallets. This adds an extra layer of protection beyond your recovery seed and PIN code.
The original and most affordable Trezor hardware wallet
Advanced hardware wallet with touchscreen and enhanced security
Follow our step-by-step setup guide at trezor.io/start to begin protecting your cryptocurrency assets today.
Start Setup NowIf you lose your recovery seed and still have access to your Trezor device with the PIN, you should immediately transfer your funds to a temporary wallet, reset your Trezor, and create a new wallet with a new recovery seed. Once the new wallet is set up, transfer your funds back from the temporary wallet. Without the recovery seed, you cannot recover your funds if your device is lost, stolen, or damaged, which is why securely storing your recovery seed is the most critical aspect of using a hardware wallet.
Yes, you can use your Trezor hardware wallet with any computer that has Trezor Bridge installed and a compatible web browser. Your cryptocurrency is stored on the blockchain, not on the device itself or your computer. The Trezor device simply stores your private keys and signs transactions. As long as you have your Trezor device, PIN, and the necessary software, you can access your funds from any compatible computer worldwide. This makes Trezor ideal for travelers who need to access their cryptocurrency from different locations.
You should update your Trezor firmware whenever a new version is available. Trezor regularly releases firmware updates that include important security patches, new features, and support for additional cryptocurrencies. The Trezor Suite application will notify you when updates are available. Before updating, ensure you have your recovery seed securely stored in case anything goes wrong during the update process. Regular firmware updates are essential for maintaining the highest level of security for your cryptocurrency assets.
The main differences between Trezor One and Trezor Model T are the interface and advanced features. Trezor Model T features a color touchscreen that makes navigation easier and allows for on-device input of passphrases. It also includes a microSD card slot for additional security features like encrypted storage and supports Shamir Backup, which allows you to split your recovery seed into multiple shares. Trezor One uses a two-button system and smaller OLED display. Both devices provide excellent security, but the Model T offers a more user-friendly experience and advanced features for power users.
No, it is not safe to purchase a used Trezor device. Hardware wallets should always be purchased new from authorized retailers to ensure they haven't been tampered with. A malicious seller could pre-install firmware that compromises the device's security or note down the recovery seed before selling it. Trezor devices include anti-tampering features like holographic seals, but these can sometimes be replicated by sophisticated attackers. For the security of your cryptocurrency, always purchase new devices directly from the official Trezor shop or authorized resellers.