Trezor — Quick start

Secure your crypto with a hardware wallet. Follow these steps to set up your device safely.

Start in minutes
Your Trezor hardware wallet isolates your private keys from the internet so you can manage cryptocurrency with confidence. This page walks you through the essentials: unboxing, initializing, creating a recovery, and best practices to protect your funds long term.

Why a hardware wallet?

Hardware wallets keep private keys offline. That reduces exposure to hacks, phishing, and malware compared with software wallets on a connected device.

Open-source & auditable

Trezor firmware and software components are open-source. Independent audits and community review build trust and transparency.

Wide coin support

Supports thousands of tokens and integrates with popular wallets and apps for both beginners and advanced users.

Recoverable

Create a recovery seed when you set up the device — it’s the only way to recover funds if the device is lost or damaged.

1

Unbox & verify

Make sure the packaging is sealed. Only initialize your device using the official website and apps. Never accept a pre-initialized device from a third party.

2

Download official software

Visit the official Trezor website to download the recommended app. Use a browser on a trusted computer; avoid public or shared machines.

3

Initialize device

Create a new wallet directly on the device. Choose a PIN and write down your recovery seed exactly as shown — keep it offline and private.

4

Verify recovery

Confirm the recovery phrase by following on-screen prompts. Consider storing parts of the recovery separately and use secure storage such as a safe.

5

Receive funds

Generate a receiving address from the device and verify it on the hardware screen before sending. For large transfers, test with a small amount first.

Best practices & security tips

Simple habits prevent most common mistakes. Below are recommended practices that every user should adopt.

  • Never share your recovery seed. No legitimate service will ask for it.
  • Use a strong PIN and passphrase. A passphrase adds a hidden layer of security that is not stored on the device.
  • Keep firmware up to date. Official updates can include important security and compatibility fixes.
  • Prefer air-gapped workflows for high-value holdings. For advanced users, consider signing transactions on a device that never connects to the internet.
  • Use multisig for extra protection. Combining multiple devices or keys helps mitigate single points of failure.

Frequently asked questions

Can I recover funds if I lose my device?

Yes — if you have your recovery seed. Keep this seed safe and consider storing it in multiple secure locations.

What if my device is stolen?

If an attacker does not know your PIN or passphrase, they cannot spend funds. Use your recovery seed to restore to a new device if necessary.

Is Trezor compatible with my coins?

Trezor supports a broad list of coins and tokens. Check compatibility lists in official documentation for the most up-to-date information.