Unbox & verify device
Inspect the device packaging for tamper-evidence. Ensure manufacturer's holograms and seals are intact. If something looks tampered with, contact official support immediately and do not use the device.
This official setup guide walks you through the complete process of preparing your Trezor hardware wallet for everyday use: unboxing, verifying authenticity, installing the recommended software, initializing the device, creating a secure backup, updating firmware, and adopting safety best practices.
Important: never share your recovery seed or private keys. Keep them offline and physically secure. This guide assumes you're using the official resources at Trezor.io/start and the Trezor Suite application; always verify download sources and checksums when available.
Inspect the device packaging for tamper-evidence. Ensure manufacturer's holograms and seals are intact. If something looks tampered with, contact official support immediately and do not use the device.
Plug the Trezor into your computer using the provided USB cable. Visit trezor.io/start in a secure browser window, or open the official Trezor Suite app. The site/app will guide you through the next steps and download any required helper like Trezor Bridge when necessary.
Follow the on-screen instructions to install Trezor Suite or any required desktop connector. Only use official downloads from the Trezor domain and verify checksums if provided.
Choose Create new on the device when prompted. The device will generate a recovery seed — write it down carefully, word by word, in the exact order shown. Confirm the seed on the device to complete initialization.
Some devices ship with older firmware. If prompted, follow instructions to update firmware from official servers. Firmware updates improve security and compatibility. Only accept updates presented within the official Suite or start flow.
Choose a PIN for local device protection. A PIN prevents unauthorized usage if your device is physically lost or stolen. Make it memorable for you but hard for others to guess. Never store PINs with your recovery seed.
Whenever sending funds, verify the receiving address on the device screen — the device is the source of truth and prevents man-in-the-middle replacements. Approve transactions only after careful review.
Adopt these best practices immediately after setup to maintain a high security posture.
If something goes wrong during setup, try these steps first before contacting support.
Yes — during initialization choose the import/restore option and enter your recovery seed exactly. Be mindful: importing a seed onto a device exposes the seed during the process; only import on secure machines and never share the seed.
A passphrase adds an additional word to your recovery seed producing a new wallet. It dramatically improves security if used correctly, but losing the passphrase means losing access to funds. Treat passphrases like secrets and consider advanced guidance before using them.
Trezor devices are designed so private keys never leave the device, protecting them from PC malware. However, malware can alter transaction data displayed on a computer; always verify transaction details on the device screen before confirming.