Either a Trezor Model T or Model One, in its original packaging. Inspect packaging for tamper evidence — if the package looks opened or altered, do not use the device and contact the vendor.
Welcome — what you’ll need
Before you begin, make sure you have:
Preferably your personal computer with updated OS and antivirus. Avoid public or guest machines. For higher safety, use a freshly updated browser and disable unnecessary browser extensions while setting up.
Write your recovery seed on physical paper (or use a metal backup plate). Never store the seed digitally (no screenshots, no cloud storage, no text files).
Download Trezor Suite (or official setup)
Use the manufacturer’s official app — typically called Trezor Suite — to complete initial setup, install firmware, and manage accounts. Always obtain downloads from the vendor's official domain and verify signatures if available.
When you download the app:
- Prefer desktop installer for full features.
- Verify checksum or PGP signature when possible.
- Run the installer and keep your OS updated.
Initial device setup
Use the supplied USB cable to connect the device to your computer. The device screen will guide you through an introductory welcome and prompt to pair with Trezor Suite or the official web app.
If the device requires firmware, follow the in-app instructions to install it. Only install firmware provided by the vendor. Do not install firmware from unknown sources.
Choose a PIN that is memorable but not trivial. The PIN protects access to the device; it is entered on the device, not your computer. You will confirm the PIN on the device screen.
Write down your Recovery Seed (very important)
The recovery seed (usually 12, 18 or 24 words) is the single most important backup for the wallet. If the device is lost, stolen, or damaged, the seed is how you restore your funds on another compatible device.
Follow the device prompts to display each seed word and write them down in order. Verify each word as the device asks. Keep the paper in a secure, fireproof, and possibly geographically redundant location.
The device will ask you to confirm a few seed words to verify that you wrote them correctly. Only proceed with setup once verification is successful.
Using the device & restoring from seed
After setup you can create accounts, receive cryptocurrency, and confirm transactions on the device. If you ever need to restore, use the vendor's official restore workflow and input your seed only on the hardware device (or on a trusted recovery tool offline).
Always confirm the address on both the computer and the device screen before sending funds. Malware can alter displayed addresses on your computer — device verification prevents this attack.
To restore, choose 'Recover wallet' in the official app and follow the device screen to enter words using the device UI. Restoring from seed recreates your keypair and account addresses.
Security best practices
Protecting your assets is primarily about process and physical security:
- Buy hardware wallets only from official vendors or trusted resellers.
- Never share your recovery seed or PIN with anyone.
- Store the seed offline in multiple secure locations; consider metal backup for fire/water resistance.
- Use a passphrase (advanced) only if you understand the tradeoffs: stronger security but higher responsibility to remember/manage it.
- Keep your device firmware and companion app up to date, but verify updates come from official sources.
- When in doubt, contact official support channels — do not rely on random internet advice for seed/keys recovery.
Troubleshooting & common questions
Try a different USB cable, another USB port, or reboot your computer. Avoid USB hubs for initial setup. Make sure the companion app is allowed by your system’s firewall.
Forgetting the PIN typically requires a factory reset. You can restore funds on a new device using your recovery seed. This is why protecting the recovery seed is essential.
If you suspect your computer is compromised, stop using it for crypto operations, move to a clean system, and consider restoring to a new device using your seed. Do not enter seed words into the compromised machine.