Follow our simple step-by-step guide to securely initialize your Trezor device and protect your cryptocurrencies from online threats.
Complete these simple steps to secure your cryptocurrencies
Check all contents including your Trezor device, USB cable, recovery seed cards, and lanyard.
Use the included USB cable to connect your Trezor to a trusted computer or mobile device.
Download and install Trezor Bridge to enable communication between your device and browser.
Follow the on-screen instructions to set up your PIN and write down your recovery seed.
The most secure way to store your cryptocurrencies
Your private keys never leave the device, protected by advanced cryptography and secure element chips.
Manage Bitcoin, Ethereum, and all major cryptocurrencies plus ERC-20 tokens in one secure place.
You own your keys - not exchanges or third parties. Trezor gives you true self-custody of your assets.
Download Trezor Suite to manage your assets with maximum security and ease of use.
Download NowTrezor devices are designed with top-tier cryptographic engineering to provide the highest level of protection for your digital assets.
Always download software directly from trezor.io/start and verify the authenticity of your device during setup. Never share your recovery seed with anyone.