Trezor Start

Official getting-started guide — secure your crypto with clarity

Begin Setup

Welcome to Trezor — Secure your crypto the simple way

Plug in your Trezor device, follow the steps below, and in a few minutes you'll have a hardened, offline-first wallet that protects your private keys from malware and remote attackers. This guide is written for both first-time users and experienced crypto holders who want a clear, modern walkthrough.

Offline Keys

Private keys never leave your device

Cross-Platform

Windows · macOS · Linux

Hundreds of Coins

Bitcoin, Ethereum, and more

Start Setup →

Quick setup — 7 clear steps

Follow these steps carefully. The goal is to create a secure device with an immutable recovery seed that only you control.

1

Download Trezor Suite

Visit the official Trezor site and download Trezor Suite for your platform — the application that talks to your device and manages accounts.

2

Connect the Device

Plug in the device with the supplied cable. If prompted by the browser, allow the connection only for the official app session.

3

Create a PIN

Set a strong device PIN directly on the device screen. The PIN protects access even if the device is stolen.

4

Write Down Recovery Seed

The device will display your 12–24 word recovery seed. Write it on paper (or a metal backup). Store it offline and never photograph it.

5

Verify Seed

Trezor will ask you to confirm words from the seed. This ensures the seed was recorded correctly and belongs to your device.

6

Add Accounts

In Trezor Suite, add cryptocurrency accounts. Each account is a read-only representation of addresses derived from your seed.

7

Secure Backup

Store your recovery seed in multiple secure physical locations. Consider a fireproof/waterproof metal backup for long-term durability.

Key features you should know

Trezor blends hardware isolation with an intuitive companion app. Below are features designed to keep your assets secure while remaining easy to use.

  • Hardware Isolation

    Private keys are generated and stored inside the device. All signing happens on-device, so your keys never touch the host computer.

  • Open Source

    Firmware and tools are open-source, allowing security researchers to audit the code and verify behavior.

  • Secure Element (optional)

    Certain Trezor models include extra hardware protections to prevent physical attacks.

  • Shamir Secret Sharing (Advanced)

    Split your recovery into multiple shares for distributed custody and enhanced resilience.

Pro tip:

Treat your recovery seed like the keys to a safe deposit box — if someone gains it, they gain everything. Use a metal backup for disaster resilience and split the seed geographically if necessary.

Frequently asked questions

Can I recover on another device?

Yes — anyone with your recovery seed can recreate the wallet on a compatible device. Keep the seed secure.

What if I lose my device?

If you have the recovery seed, you can recover funds on a new Trezor or compatible wallet. Without the seed, funds are irretrievable.

Are seeds backed up to Trezor servers?

No. Seeds are generated on-device and never leave it. Trezor does not store your seed.

Can I use Trezor with mobile?

Yes — some mobile wallets support Trezor through compatible bridges or Bluetooth in supported models. Check official docs for specifics.

Trezor Start@ — Getting Started with Trezor