From Trezor Wiki
Revision as of 23:27, 8 June 2018 by Sipak (talk | contribs) (TREZOR > Trezor)
Jump to: navigation, search

Software design & security[edit]

What are a recovery seed, a PIN and encryption passphrase and the difference between them?[edit]

Recovery seed is a mnemonic code made of 12, 18 or 24 words depending on your choice. This seed is generated the first time you run Trezor and will help you recovering it's contents (private keys, bitcoin balance, and transaction history) into a new device if you lose your Trezor.

PIN is a number that you set when you first run Trezor. It protects Trezor against being used by unauthorized persons. We have invented a secure way of entering the PIN so it can’t be key-logged and misused.

Encryption passphrase can be set on top of the PIN. This protects the device in case of a seizure. It's using military-grade encryption of the seed on Trezor storage, so even torturing the device in a laboratory won't leak your private keys.

A combination of these security mechanisms makes your bitcoin ownership with Trezor absolutely safe.

Is it safe to enter the PIN on my computer and not on the Trezor itself?[edit]

Trezor doesn't have a keyboard but even if you enter the PIN on the computer directly, you're perfectly safe. Trezor's PIN mechanism is protected against key-loggers, so using it even in internet cafes means no risk for you.

Why should I trust Trezor with my private keys?[edit]

Because the entire software design of Trezor is open-source. You can verify the product by yourself or find some other professional you trust to do so.

You can find all the repositories at GitHub.

How can a seed made of several simple words be more secure than a strong password with caps or numerical signs?[edit]

We love this picture, it explains it all:

Password strength.png

Comic by XKCD: Randall Munroe, licensed under Creative Commons Attribution-NonCommercial 2.5 License.

Why should I do a paper backup of my seed?[edit]

We think paper backups are the easiest and safest way of storing such information for a common computer user. Computer backups, on the contrary, are vulnerable to hardware damage and subject to frequent hacker attacks.

If somebody steals my Trezor, they'll just empty out my wallet before I have the chance to restore anyway. Right?[edit]

Not at all. All operations on Trezor require the user to enter a PIN. The attacker would have to guess your PIN which is very difficult because with each badly entered PIN the time for entering it anew increases exponentially. For example, the delay between 19th and 20th PIN entering is 35 hours. Unplugging and plugging the device won’t help. The thief would have to sit his life off entering the PINs. Meanwhile, you have enough time to move your funds into a new device or wallet from the paper backup.

You can also hide your wallet behind passphrase which can be set on top of the PIN. Read more about the multi-passphrase encyption (hidden wallets).

Like Trezor? Get one here!