Trezor.io/Start

Official Start Page — Initialize Your Device™

Welcome — purpose of this guide

This page is designed to help you initialize your Trezor hardware wallet securely and confidently. Initial setup is the most critical moment in the lifecycle of your device: it establishes the private keys that control your assets, creates the recovery seed that allows future access, and sets basic protections like a PIN. Follow the steps below carefully, and treat your recovery information as the single most valuable secret you own.

Step 1 — Verify your purchase and packaging

Only accept devices purchased directly from trezor.io or authorised resellers. Examine packaging for tamper-evident seals and unopened boxes. When you first power the device it should prompt you to begin initialization; a device that arrives pre-initialized or asking for a seed should be treated as compromised — contact official support and do not use it for holdings.

Step 2 — Initialize on-device

Create a PIN: Choose a PIN that you can remember but that is not easily guessable. Enter it only on the device’s buttons or screen. The PIN prevents unauthorized local access if the device is stolen.
Generate your recovery seed: Allow the device to create a new recovery seed (12, 18, or 24 words depending on model/config). Write the words down in the exact order on the supplied recovery card or on a durable metal backup. Do not take photographs or store the seed in digital form.
Confirm your seed: The device will ask you to confirm words — do this on-device. Confirming ensures the seed was written correctly and that the phrase will restore access if the device is lost.

Step 3 — Install Trezor Suite and verify firmware

Download Trezor Suite from trezor.io to manage your device. The Suite will guide firmware verification and installation. Firmware is signed and should only be installed via official channels. Firmware updates patch vulnerabilities and add features; verify the signature in the Suite before applying updates. If anything about the firmware verification fails, contact support.

Step 4 — Use and verify addresses

When receiving funds, always display the receiving address on both the host application and the device screen. Confirm they match before sharing the address. When sending funds, always verify the recipient address and amount on the device’s screen prior to approval. This prevents man-in-the-middle or clipboard-hijacking attacks from altering transaction details.

Best practices and advanced options

For additional security consider a passphrase-protected wallet, use multisignature setups for very large holdings, and explore air-gapped workflows where transactions are signed offline and transferred via QR code or SD card. Use a steel backup plate for seed durability and store backups in separate secure physical locations. Regularly review your threat model and adapt protections to the value you hold and the risks you face.

Recovery testing and incident response

Periodically test your recovery procedure using a spare device. A mock recovery will confirm that backups are correct and accessible. If you suspect any exposure of your seed or passphrase, move funds immediately to a new seed and device. Maintain a minimal incident response plan: who to contact, where backups are stored, and how to transfer assets quickly if needed.

Example test address (do not use for funds):
bc1qexampletestaddress0000000000000000000000

Final checklist

This page is an informational mockup. For official purchases, firmware, and support use Trezor's verified channels at trezor.io.