Trezor.io/Start® | Starting Up Your Device | Trezor®

Clean presentation guide — step-by-step startup, safety tips, troubleshooting and glossary.

Welcome — preparing to start

This guide walks you through powering up a Trezor hardware wallet for the first time. It focuses on safe setup, creating a recovery seed, verifying authentic firmware, and recommended privacy and backup practices. Everything below is written in plain language and optimized for clarity so you can follow the process confidently.

Quick checklist
  • Have your computer or phone ready (USB / OTG cable as needed).
  • Work in a private space — avoid public Wi-Fi during setup.
  • Use only official firmware and the official Trezor website (trezor.io/start).
  • Prepare a secure place to store the recovery seed (paper or metal).

Step-by-step setup

1. Inspect device & packaging

Start by checking the box and the device for tamper evidence. Unopened packaging should look factory-sealed. If any seals are broken or the device looks modified, do not proceed — contact the vendor or the official Trezor support channel.

2. Connect to the computer or phone

Connect the device with the official cable. For mobile devices use an OTG adapter if needed. Use only trusted machines; avoid computers you don't control. The Trezor will show a welcome screen requesting you to visit trezor.io/start.

3. Use the official website and verify URLs

Always navigate to the official onboarding address typed directly into your browser: trezor.io/start. Confirm the site certificate (click the padlock) and verify that the page is served over HTTPS. Beware of phishing pages and search-engine results that look similar.

4. Install recommended software

Follow the official instructions to install the Trezor Suite or use the recommended browser extension. When prompted, install device firmware only from the official source. Never install third-party firmware.

5. Initialize & create a new wallet

Choose "Create new wallet" on the device and in the suite. The device will generate a recovery seed (a series of words) privately inside the hardware. Write these words down carefully and in order — do not store the seed as a file or photo.

  • Choose to create a fresh seed (recommended) rather than restoring from an unknown source.
  • Consider optional passphrase protection for enhanced security — this acts as a 25th word and must be remembered.

6. Backups and storage