Trezor
Start — Secure your crypto

Own your keys. Own your future.

Trezor keeps your crypto off the internet and under your control — built with simplicity for everyone and security for the long haul.

1
Unbox
Open your Trezor — genuine device seal included.
2
Plug & Setup
Follow the on-device prompts — no accounts, no cloud backups.
3
Protect
Create a PIN and a recovery seed — store it safely offline.
How it works — simple, private, secure
Cold storage
Private keys never leave your device. Transactions are signed offline.
Open firmware
Auditable, community-reviewed firmware that keeps you in control.
Recovery & backup
Create a 12–24 word seed — the only backup you need, stored where you choose.
Ready in minutes

Trezor was built for people who want clear, fast onboarding without compromising on the strongest security practices. Plug in, set a PIN, write down your recovery — and you’re in control.

Supported assets

Bitcoin, Ethereum, major tokens, NFTs, and thousands of other coins — managed directly from Web or Desktop Wallets that connect to your device.

Best practices — keep your crypto safe

Security, explained simply

Trezor separates the act of signing transactions from your computer. Think of it as a safe: the keys live inside the device, and you use the device to sign — never revealing the keys to the outside world. Every action requires your physical confirmation on the device itself.

What if I lose my Trezor?

As long as you have your recovery seed, you can restore your funds to a new device. That’s why securely storing the seed is the single most important step.

Is Trezor compatible with my coins?

Trezor supports thousands of assets through official wallets and community integrations. Check compatibility in the app before transferring large amounts.

How do I update firmware?

Firmware updates are published by Trezor, cryptographically signed, and applied via the official wallet. Your keys remain safe during updates.

Can someone access my funds remotely?

No. Transactions require physical confirmation on your device. Remote attackers cannot sign transactions without it.