Getting started in 5 steps

From Trezor Wiki
Jump to: navigation, search
Trezor Wiki/User/ Getting started in 5 steps
T1 device.jpg
Trezor One

This article will help you set up a new cryptocurrency wallet on your Trezor One (show for Trezor Model T). If you ever need a detailed explanation or you run into an issue, please check the User manual or visit our Support Center.

NoteThe steps outlined in this article are optimized for users accessing Trezor Wallet while using a Chrome or Firefox browser on a computer running Windows, macOS or Linux. For the complete description of all supported configurations, please refer to the User manual.

1. Getting to know your Trezor[edit]

A Trezor device is a single purpose computer which allows you to secure your cryptocurrencies, sign transactions, and manage your digital identity. All private data is stored in its persistent memory, which will not be erased even if you do not use the device for an extended period of time. Trezor does not need a battery since it draws power through its USB connection. Trezor may be used for a variety of ever-expanding purposes through a wide range of compatible software, starting with Trezor Wallet.

Trezor Wallet is an easy-to-use browser interface for your Trezor device. Using Wallet, you can easily control your cryptocurrency assets, manage your accounts, initiate transfers to other services or friends, and more.

2. Unboxing your Trezor[edit]

Package T1 content1.png
Trezor One package contents

The package comes wrapped in a thin plastic foil, with noticeable security seals over two of its sides, and is carefully sealed with a strong glue. After tearing the package open, you will find the following contents: Trezor device, USB cable, Recovery seed cards (2pcs), Lanyard, Getting started booklet, Stickers (4 pcs).

ImportantCheck the integrity of both holographic seals to make sure your package has not been tampered with. If the security seals had been broken before you received the package, please contact us using Support center. For more information, see Tamper-evident hologram and Trezor packaging timeline.

3. Setting up your new device[edit]

Enable communication and connect the device[edit]

Begin the setup process by connecting your Trezor device to your computer using a USB cable. Please make sure that the device is properly connected.When connected, open your browser and visit as indicated on your Trezor's screen. Continue by selecting your Trezor model.

Download and install Trezor Bridge, an application which facilitates communication between your Trezor device and your computer. After successfully installing, refresh the page and let Trezor Wallet automatically detect your Trezor device.

Trezor Bridge is a program designed to run in the background and requires no interaction. In other words, there is no need to open or do anything with Bridge once it is installed.

Install the latest firmware[edit]

New Trezor devices are always shipped without a preinstalled firmware to ensure the latest firmware is installed when initializing a new device. Leaving this step to you also enables you to check the legitimacy of the firmware. To install the firmware, simply click on Install firmware.To finish the installation, reconnect your Trezor device when asked.

Important If you receive a new Trezor device with the firmware already installed, please contact us immediately using the Support center.

Create a new wallet[edit]

To generate a new wallet, click on Create wallet. Your device will generate a new and unique seed which will hold all of your accounts and addresses. Now, although Trezor is ready to be used, we strongly recommend continuing with the onboarding process. To ensure maximum safety of your Trezor, complete the following four steps.

Create a backup[edit]

Click on Create a backup in 3 minutes. and prepare to write down your recovery seed on the specially designed cards included in the package. You will be presented with a random set of English words, each displayed on your device's screen.

Note that the seed will only be presented to you twice in a row and then never again. It is not possible to get to the seed or have the device display the words ever again. Pay close attention to every word and make sure you write it down correctly and in the right order.

Wallet onboarding bar.png

Push the right button on your device to see the next word of your recovery seed. Carefully write down the words in the exact order they are presented. Once all of the words are recorded in the recovery card, your Trezor device will display the 24-word recovery seed again so you can verify the correct order and spelling.

WarningNever make a digital copy of your recovery seed and never upload it online!

In case the backup fails during the process (e.g., because of a power failure), see Recovery seed backup fail.

Name your device[edit]

Giving your device a unique name to make it distinguishable will help you quickly identify your device and make it easier to select it in Trezor Wallet, especially if you use multiple devices. The maximum length of the name is 16 characters.

Set up a PIN[edit]

PIN T1 matrix 03.gif
Entering PIN on Trezor One

A PIN protects your Trezor device against unauthorized physical access. It is recommended to set up PIN protection as soon as you initialize your new device.

Enter your PIN by clicking on the obscured numerical pad displayed in the browser. The layout revealing the position of the digits is displayed on your Trezor device. The PIN layout changes at each new prompt. Recommended PIN length is 4-6 digits without repeating digits. The maximum PIN length is 9 digits.

Having trouble entering a PIN? See our User manual for detailed instructions

Bookmark the page[edit]

Create a bookmark in your browser to enable easy access to the Trezor Wallet interface. By creating a bookmark, you will be able to avoid unnecessary googling and distractions trying to get you to a fraudulent site.

Do you know how to protect yourself against phishing attacks? Read more in "Phishing attacks used to steal your coins (recommended reading)"

Stay in touch[edit]

Subscribe to our newsletter and follow us on social media (Twitter,Facebook, Reddit...) to keep updated on news about Trezor development, upcoming features, and emerging applications. You can also subscribe any other time by filling in the form at the very bottom of

Congratulations, your new Trezor is now fully set up and safe to use!

See User manual for more details about the setup process.

4. Mastering the basic Trezor Wallet operations[edit]

Switching between cryptocurrencies[edit]

Trezor supports over 1000 coins and tokens. Select the corresponding cryptocurrency from a drop-down menu in the upper-left part of the Trezor Wallet interface.

Note that some coins or tokens are only accessible through a third-party interface. Refer to for more details about supported cryptocurrencies.

Wallet Receive.png

Receiving payments[edit]

To receive a payment, select an account and click on the Receive tab. The receiving address should be verified on your Trezor device by clicking on Show full address. After verification, copy the receiving address and share it to receive your funds.

ImportantGenerate a new address for each receiving transaction to maintain your privacy

Making payments[edit]

To make a payment, select an account and go to the Send tab. Now, paste the recipient's address and enter the amount. Optionally, you can change the transaction priority by adjusting the transaction fee.

WarningDo not send or receive transactions to addresses generated for a different cryptocurrency, e.g. bitcoin cash to a bitcoin address.

Personalizing the homescreen[edit]

Apart from giving your device a nice personal touch, a custom homescreen can serve as another measure against physical attacks. Having a custom homescreen will quickly let you know whether the device is yours or a forged copy. You can personalize your homescreen by selecting your device in our Wallet interface and navigating to the Homescreen tab. You can choose from a wide variety of preloaded images or upload your own.

5. Staying on top of the security best practices[edit]

Choose a unique and strong PIN[edit]

Similar to your phone or credit card, the PIN is there to shield your device from unauthorized physical access. It is in your best interest to keep the PIN memorable, but complex enough to make it difficult to guess. We recommend keeping the PIN at least 4-6 digits long. Avoid using a direct sequence (1234) and duplicating digits (1133, 12334, etc.).

See our blog post "3 Simple Rules for a Good PIN" for more details on the topic.

Keep your recovery seed safe[edit]

Seed card front.png
Recovery seed card

You can think of the recovery seed as an ultimate express-pass to your funds. While it is undeniably very useful to you in emergency situations, it can prove to be dangerous if stolen, lost, or destroyed. It is absolutely crucial to keep your seed in a safe and easy-to-remember location.

You should always write your recovery seed on a piece of paper or other durable surface with a lasting marker. Do not make any digital copies of your recovery seed and never store it on your computer.

See our blog post "A few tips on storing your recovery seed" for more details on the topic.

A few words about passphrase protection[edit]

Enabling the passphrase protection in Wallet Advanced settings lets you hide your accounts by "building" an additional layer onto your seed. Unlike a PIN, the passphrase is never stored on the device, and your wallet becomes dependent on it. When you enable this feature, Trezor will ask you to enter the passphrase which will then be combined with your seed (24-word seed used to backup your Trezor) and a new, unique account will be created. Now you might ask "Why bother?". While a PIN provides effective protection for your device, you can think of the passphrase as the ultimate safeguard for your seed.

See our blog post "Passphrase — the ultimate protection for your accounts" for more details on the topic.

WarningThe passphrase feature is an advanced security measure. It is recommended to use this feature only if you confidently understand its risks and advantages.

You can read more about security best practices in our User manual.

Like Trezor? Get one here!