Getting started in 5 steps

From Trezor Wiki
Jump to: navigation, search
Trezor Wiki/User/ Getting started in 5 steps
T2 device.jpg
Trezor Model T

This article will help you set up a new cryptocurrency wallet on your Trezor Model T (show for Trezor One). If you ever need a detailed explanation or you run into an issue, please check the User manual or visit our Support Center.

NoteThe steps outlined in this article are optimized for users accessing Trezor Wallet while using a Chrome or Firefox browser on a computer running Windows, macOS or Linux. For the complete description of all supported configurations, please refer to the User manual.

1. Getting to know your Trezor[edit]

A Trezor device is a single purpose computer which allows you to secure your cryptocurrencies, sign transactions, and manage your digital identity. All private data is stored in its persistent memory, which will not be erased even if you do not use the device for an extended period of time. Trezor does not need a battery since it draws power through its USB connection. Trezor may be used for a variety of ever-expanding purposes through a wide range of compatible software, starting with Trezor Wallet.

Trezor Wallet is an easy-to-use browser interface for your Trezor device. Using Wallet, you can easily control your cryptocurrency assets, manage your accounts, initiate transfers to other services or friends, and more.

2. Unboxing your Trezor[edit]

Package T2 contents.png
Trezor Model T package contents

To open the box, first slide the white sleeve away. The black case is held together by glue and a magnet. Flip away the fold on the lower part of the case and lift up the cover. The Trezor device rests on a magnetic dock. In the black box next to your device, you will find: USB-C cable, Recovery seed cards (2pcs), Getting started booklet, Stickers (4 pcs).

Important Check the integrity of the holographic seal on your device upon opening the package. The seal should be sitting tightly over the USB-C port of the Trezor. When removed, it leaves noticeable marks. If you find this seal impaired in any way, please contact us using Support center. For more information, see Tamper-evident hologram and Trezor packaging timeline.

3. Setting up your new device[edit]

Enable communication and connect the device[edit]

Begin the setup process by connecting your Trezor device to your computer using a USB cable. Please make sure that the device is properly connected - push the cable until you feel a slight click (this might require a little bit of force).When connected, open your browser and visit as indicated on your Trezor's screen. Continue by selecting your Trezor model.

Download and install Trezor Bridge, an application which facilitates communication between your Trezor device and your computer. After successfully installing, refresh the page and let Trezor Wallet automatically detect your Trezor device.

Trezor Bridge is a program designed to run in the background and requires no interaction. In other words, there is no need to open or do anything with Bridge once it is installed.

NoteIn Chrome, you can also connect your device using WebUSB, while in Firefox, Bridge is the only option.

Install the latest firmware[edit]

New Trezor devices are always shipped without a preinstalled firmware to ensure the latest firmware is installed when initializing a new device. Leaving this step to you also enables you to check the legitimacy of the firmware. To install the firmware, simply click on Install firmware.

Important If you receive a new Trezor device with the firmware already installed, please contact us immediately using the Support center.

Create a new wallet[edit]

To generate a new wallet, click on Create wallet. Your device will generate a new and unique seed which will hold all of your accounts and addresses. Now, although Trezor is ready to be used, we strongly recommend continuing with the onboarding process. To ensure maximum safety of your Trezor, complete the following four steps.

Create a backup[edit]

Click on Create a backup in 3 minutes. and prepare to write down your recovery seed on the specially designed cards included in the package. You will be presented with a random set of English words, each displayed on your device's screen.

Note that the seed will only be presented to you twice in a row and then never again. It is not possible to get to the seed or have the device display the words ever again. Pay close attention to every word and make sure you write it down correctly and in the right order.

Wallet onboarding bar.png

Swipe your finger up the touchscreen to view the next set of words. Carefully write down the words in the exact order they are presented. Once you have written down all the secret words, you will be asked to enter a few randomly selected words from your 12-word seed on the touchscreen.

WarningNever make a digital copy of your recovery seed and never upload it online!

In case the backup fails during the process (e.g., because of a power failure), see Recovery seed backup fail.

Name your device[edit]

Giving your device a unique name to make it distinguishable will help you quickly identify your device and make it easier to select it in Trezor Wallet, especially if you use multiple devices. The maximum length of the name is 16 characters.

Set up a PIN[edit]

A PIN protects your Trezor device against unauthorized physical access. It is recommended to set up PIN protection as soon as you initialize your new device.

Use the device touchscreen to set up and enter your PIN. The PIN layout changes at each new prompt. Recommended PIN length is 4-6 digits. The maximum PIN length is 9 digits.

Having trouble entering a PIN? See our User manual for detailed instructions

Bookmark the page[edit]

Create a bookmark in your browser to enable easy access to the Trezor Wallet interface. By creating a bookmark, you will be able to avoid unnecessary googling and distractions trying to get you to a fraudulent site.

Do you know how to protect yourself against phishing attacks? Read more in "Phishing attacks used to steal your coins (recommended reading)"

Stay in touch[edit]

Subscribe to our newsletter and follow us on social media (Twitter,Facebook, Reddit...) to keep updated on news about Trezor development, upcoming features, and emerging applications. You can also subscribe any other time by filling in the form at the very bottom of

Congratulations, your new Trezor is now fully set up and safe to use!

See User manual for more details about the setup process.

4. Mastering the basic Trezor Wallet operations[edit]

Switching between cryptocurrencies[edit]

Trezor supports over 1000 coins and tokens. Select the corresponding cryptocurrency from a drop-down menu in the upper-left part of the Trezor Wallet interface.

Note that some coins or tokens are only accessible through a third-party interface. Refer to for more details about supported cryptocurrencies.

Wallet Receive.png

Receiving payments[edit]

To receive a payment, select an account and click on the Receive tab. The receiving address should be verified on your Trezor device by clicking on Show full address. After verification, copy the receiving address and share it to receive your funds.

ImportantGenerate a new address for each receiving transaction to maintain your privacy

Making payments[edit]

To make a payment, select an account and go to the Send tab. Now, paste the recipient's address and enter the amount. Optionally, you can change the transaction priority by adjusting the transaction fee.

WarningDo not send or receive transactions to addresses generated for a different cryptocurrency, e.g. bitcoin cash to a bitcoin address.

Personalizing the homescreen[edit]

Apart from giving your device a nice personal touch, a custom homescreen can serve as another measure against physical attacks. Having a custom homescreen will quickly let you know whether the device is yours or a forged copy. You can personalize your homescreen by selecting your device in our Wallet interface and navigating to the Homescreen tab. You can choose from a wide variety of preloaded images or upload your own.

5. Staying on top of the security best practices[edit]

Choose a unique and strong PIN[edit]

Similar to your phone or credit card, the PIN is there to shield your device from unauthorized physical access. It is in your best interest to keep the PIN memorable, but complex enough to make it difficult to guess. We recommend keeping the PIN at least 4-6 digits long. Avoid using a direct sequence (1234) and duplicating digits (1133, 12334, etc.).

See our blog post "3 Simple Rules for a Good PIN" for more details on the topic.

Keep your recovery seed safe[edit]

Seed card front.png
Recovery seed card

You can think of the recovery seed as an ultimate express-pass to your funds. While it is undeniably very useful to you in emergency situations, it can prove to be dangerous if stolen, lost, or destroyed. It is absolutely crucial to keep your seed in a safe and easy-to-remember location.

You should always write your recovery seed on a piece of paper or other durable surface with a lasting marker. Do not make any digital copies of your recovery seed and never store it on your computer.

See our blog post "A few tips on storing your recovery seed" for more details on the topic.

A few words about passphrase protection[edit]

Enabling the passphrase protection in Wallet Advanced settings lets you hide your accounts by "building" an additional layer onto your seed. Unlike a PIN, the passphrase is never stored on the device, and your wallet becomes dependent on it. When you enable this feature, Trezor will ask you to enter the passphrase which will then be combined with your seed (12-word seed used to backup your Trezor) and a new, unique account will be created. Now you might ask "Why bother?". While a PIN provides effective protection for your device, you can think of the passphrase as the ultimate safeguard for your seed.

See our blog post "Passphrase — the ultimate protection for your accounts" for more details on the topic.

WarningThe passphrase feature is an advanced security measure. It is recommended to use this feature only if you confidently understand its risks and advantages.

You can read more about security best practices in our User manual.

Like Trezor? Get one here!