Trezor.io/Start | Starting® Up® Your® Device®

This is the official, secure path to initializing your **Trezor hardware wallet**. Follow these sequential steps to establish your **cold storage** and gain **self-custody** of your **digital assets**.

Phase 1: Verification and **Trezor Suite** Setup

1

Physical Security Check

Before you connect, ensure the physical integrity of your device. Inspect the packaging for any signs of **tampering**. Check the holographic seal (Model One) or the plastic casing seal (Model T). If the seal is broken, damaged, or appears altered, **do not plug in the device**. This is the first and most fundamental step in your **crypto security** journey.

Once verified, connect your **Trezor device** to your computer using the supplied USB cable. The device screen will light up, displaying a welcome message. This confirms the device is receiving power and is ready for the next step: installing the management software.

2

Download and Install **Trezor Suite**

The **Trezor Suite** is the dedicated desktop application required for seamless and secure interaction with your **hardware wallet**. Navigate directly to the official start page: suite.trezor.io/start/. Download the version corresponding to your operating system (Windows, macOS, or Linux).

Never use web wallets or third-party software unless explicitly directed by Trezor documentation. The **Trezor Suite** ensures a **secure connection** and verifies all communication protocols locally. After installation, launch the Suite, and it will automatically detect your connected **Trezor device**, initiating the firmware process.

Phase 2: **Firmware** and **Recovery Seed** Creation

3

Installing the **Device Firmware**

Firmware is the operating system of your **Trezor device**. The **Trezor Suite** will prompt you to install the latest, officially verified firmware. This is critical for security and functionality. The device is shipped without firmware as an added security layer, forcing you to load the latest, known-good version.

During installation, **do not disconnect the device**. Follow the on-screen instructions in the **Trezor Suite** and confirm the installation on the **Trezor device** screen itself. Once complete, the device will reboot, ensuring a pristine operating environment. After the reboot, you will be prompted to create a new wallet, leading to the generation of your master **private keys**.

4

Generating and Backing Up the **Recovery Seed**

This is the most crucial step for securing your **cold storage**. Your **Recovery Seed** (24, 18, or 12 words) is your **master backup**. The words will appear **only on your Trezor device screen**, keeping them isolated from potential computer threats.

Carefully write down every word, in the exact order, on the **provided paper recovery card**. Verify your writing as you go. The **Trezor Suite** will then guide you through a verification process, asking you to re-enter a few specific words to confirm the accuracy of your written backup. This rigorous verification protects you against errors that could lead to irrecoverable loss.

**CRITICAL SECURITY ALERT: THE MASTER KEY**

Your **Recovery Seed** grants access to all your **cryptocurrency** on all supported chains. If you lose the seed, you lose your funds. If the seed is found by another person, they gain full access.

RULE: The seed must remain in **physical cold storage**—never scanned, photographed, typed, emailed, or stored in any digital format whatsoever.

Store your **Recovery Seed** backup in a safe, fireproof, and private location.

Phase 3: Finalizing Setup and Daily Security

5

Setting Your Secure **PIN**

The **PIN** is your protective lock for the **Trezor device** itself. If someone steals your Trezor, the PIN prevents unauthorized access. The **Trezor Suite** uses the randomized, scrambled PIN entry method: the numbers on your computer screen change position relative to the fixed grid displayed on your device.

You must look at your **Trezor device** to know which button to press on the **Trezor Suite** interface. This process is designed to defeat keyloggers and screen-recording malware, reinforcing the isolation of your **cold storage** access.

6

Device Labeling and Completion

As the final step, you will be prompted to label your **Trezor device**. Choose a unique, easily identifiable name. This label is displayed on the device screen upon connection, providing an extra layer of visual confirmation that you are interacting with the correct **hardware wallet**.

Congratulations! Your device is now fully secured. You can now access the **Trezor Suite** dashboard to create accounts, receive **Bitcoin** and other **digital assets**, and explore advanced features like **Passphrase** and **CoinJoin** security.

Go to Trezor Suite Dashboard