Welcome to Your Trezor Setup

Follow this comprehensive guide to securely set up your Trezor hardware wallet and protect your cryptocurrency assets.

1

Unbox Your Trezor Device

Carefully open your Trezor package and verify all components are present. Your package should include:

  • Trezor hardware wallet
  • USB cable
  • Recovery seed card
  • Lanyard and stickers

Inspect the device for any signs of tampering. The holographic seal should be intact.

Trezor Device Image
2

Connect to Trezor Suite

Download and install Trezor Suite, the official desktop application for managing your Trezor device.

Connect your Trezor to your computer using the provided USB cable. The device will display a welcome message.

Ensure you're downloading Trezor Suite from the official website to avoid phishing attempts.

Trezor Suite Interface
3

Install Firmware

Trezor Suite will automatically detect your device and prompt you to install the latest firmware.

Firmware updates include security enhancements and new features. Always keep your device updated.

The installation process takes a few minutes. Do not disconnect your device during this process.

Firmware Installation
4

Create Your Wallet

Choose to create a new wallet. Your Trezor will generate a unique recovery seed - a list of 12, 18, or 24 words.

This recovery seed is the most important piece of information for your wallet. It allows you to recover your funds if your device is lost or damaged.

Write down the words in the exact order they appear on your Trezor screen.

Recovery Seed Display
5

Verify Your Recovery Seed

Trezor will ask you to confirm your recovery seed by selecting the words in the correct order.

This step ensures you have correctly written down your recovery seed and can restore your wallet if needed.

Never share your recovery seed with anyone and store it in a secure location.

Seed Verification
6

Set a PIN

Protect your device with a PIN. The PIN is entered using the Trezor's touchscreen or by clicking randomized numbers on Trezor Suite.

Choose a PIN that's difficult to guess but easy for you to remember. The PIN prevents unauthorized access if your device is stolen.

Each incorrect PIN attempt increases the delay before the next attempt, protecting against brute-force attacks.

PIN Setup Interface