Trézor.io/Start® — Starting Up Your Device

Quick, secure, and clear steps to get your Trézor® device ready — from unboxing to first transaction.

Getting started — step by step

1. Inspect the package

Before opening, confirm packaging integrity. Genuine Trézor® devices ship with tamper-evident seals and manufacturer labels. If anything looks damaged or tampered with, contact support before proceeding.

2. Unbox & verify contents

  1. Device unit (Trézor® hardware wallet)
  2. USB cable
  3. Recovery seed cards
  4. User guide and warranty

3. Power up and connect

Connect your device to a computer using the supplied USB cable. Visit https://trézor.io/start (note: use the browser URL bar — avoid search results) and follow on-screen prompts. The official site will guide you to the supported app or web interface.

4. Confirm genuine firmware

Why this matters: Firmware attestation prevents counterfeit or tampered devices from operating. The first-time setup will display a device fingerprint or QR code you can verify against the web app.

5. Initialize device & set a PIN

Choose a strong, memorable PIN when prompted. The PIN protects access to the device itself — it is required for every sensitive operation. If you prefer, enable a passphrase later for layered security.

6. Write down your recovery seed

CRITICAL: The recovery seed (usually 12–24 words) is the single most important backup for your wallet. Write it on the supplied recovery cards, store them offline in a secure location, and never share the seed with anyone. Do not photograph or store the seed digitally.

7. Firmware updates

After initialization, the app may offer a firmware update. Only install firmware updates presented by the official site or verified app. Firmware updates may improve security and add features. Verify the update signature when prompted.

8. Test with a small transaction

Before moving significant funds, send a small test transaction to confirm end-to-end flow and that addresses shown on your device match the app. Always verify addresses on the device screen, not only in the browser.

Advanced: passphrase, hidden wallets & multi-sig

Advanced users may enable a passphrase (BIP-39 passphrase) to create hidden wallets or use multi-signature setups for stronger operational security. These features increase safety but also increase complexity — ensure you document recovery procedures and test recovery before moving large amounts.

Multi-signature basics

Multi-sig distributes signing authority across multiple devices or custodians. It reduces single-point-of-failure risk but requires careful key management and coordination between signers.