Step-by-step: Setup & First Login (H2)
Unbox and Inspect (H3)
Confirm package integrity, tamper-evident seals, and that your device serial matches packaging. Physical authenticity matters for a secure Trezor®® Hardware® Login*.
Connect safely (H3)
Connect the device to a trusted computer and only visit the official interface recommended by the manufacturer. Avoid third-party pages that promise "simpler login" workflows.
Initialize & Write Down the Seed (H3)
Follow the on-device prompts to create a new wallet. Write down your recovery seed using the supplied card or a certified steel backup — never store the seed digitally.
Set a PIN & Optional Passphrase (H3)
Create a strong PIN for routine unlocking. For advanced users, consider an additional passphrase to produce hidden wallets and increase protection for high-value holdings.
Complete First Login (H3)
After initialization, perform your first Trezor®® Hardware® Login* to confirm everything works. Check that account balances display correctly and that signing requests are shown on-device.
Advanced® Configuration & Security (H2)
Advanced® users often need more flexible control. The following sections use expert-level vocabulary and explain features often referenced in advanced documentation.
Passphrase Strategy (H3)
Consider whether to use a passphrase (25+ characters recommended) combined with your seed. A passphrase creates a deterministic but hidden wallet: the same seed + passphrase yields a different wallet. Treat passphrases as secret credentials — if you forget it, you lose access to that hidden wallet.
Hidden Wallets & Plausible Deniability (H3)
Hidden wallets are produced by unique passphrases. Use them to separate funds and create plausible deniability. Maintain an honest record of your public wallet while protecting the presence of hidden wallets.
Firmware & Attestation (H3)
Always verify firmware authenticity. Use attestation features where available to confirm your device firmware is genuine. Enable automatic firmware checks or use signed firmware packages provided by the vendor.
Air-gapped Signing & Advanced Workflows (H3)
For extremely high security, consider air-gapped signing: keep your Trezor offline, export unsigned transactions to a separate device, sign on the Trezor, then broadcast using a networked machine. This reduces exposure to remote compromise.
Best Practices — Security & Maintenance (H2)
Physical Security (H3)
Keep your hardware in a locked drawer or safe when not used. Use tamper-evident packaging for transfers and always check the device before entering your PIN for the first time after transport.
Backup & Recovery (H3)
Prefer multiple backups: a primary paper/steel backup stored securely, and a second off-site encrypted backup if necessary. Test your recovery procedure periodically to ensure recoverability — practice on an expendable device or testnet.
Social Engineering Defense (H3)
Never share seed words or passphrases. Beware of phishing websites, unsolicited support callers, or social media scams offering "help" to recover wallets — legitimate vendors never ask for your seed.
Troubleshooting & FAQ (H2)
Common issues during Trezor®® Hardware® Login* flows appear often; these answers will help you quickly diagnose and resolve them.