Trezor.io/Start
Starting® Up® Your® Device® — Quick setup & security guide
Get started safely

Welcome — power on, secure, and prepare your device

This page contains step-by-step instructions and security best practices to get your hardware wallet ready. Read everything carefully and keep your recovery information offline.

Starting Up Your Device® Welcome to your new hardware wallet. This guide walks you through powering up, securing, and preparing your device for use. Follow each step carefully to make sure you retain full control of your funds and reduce the risk of loss or theft.


Unboxing and inspection When you open the package, verify the tamper-evident seals, check the device for scratches or damage, and confirm that all accessories are present. If anything appears tampered with, contact support before proceeding.


Powering up and initial boot Connect the device to your computer using the provided USB cable or to a mobile adapter. Power the device and wait for the welcome screen. If the screen displays unexpected content, disconnect and contact support.


Creating a new wallet Select the option to create a new wallet. You will be asked to generate a recovery seed. This seed is your master backup. Write the seed on the provided recovery card and store it securely in a location only you can access. Never share the seed with anyone, and never enter it on a website or computer other than the device itself.


Setting a PIN Set a strong PIN to protect the device from unauthorized access. Choose a PIN length and pattern that are memorable to you but hard for others to guess. The device will ask for the PIN on each connection.


Firmware updates Check for firmware updates during setup. Updating firmware fixes bugs and strengthens security. Only install updates that are published and verified by the device manufacturer. Avoid using unofficial or modified firmware.


Connecting to software Install the official companion app or browser extension recommended by the manufacturer. Only use verified downloads from the official website. Connect the device and follow on-screen prompts to pair and synchronize accounts.


Adding accounts and cryptocurrencies Use the companion app to add cryptocurrency accounts you plan to manage. Only add tokens that are supported by your device and app. Be cautious with newly created or unverified tokens.


Receiving and sending funds To receive funds, generate a new address on the device and share it with the sender. Verify the address on the device screen before accepting incoming transactions. To send funds, confirm transaction details on the device display and approve them with your PIN.


Backing up and recovery Store your recovery seed in multiple secure locations if necessary, but avoid any digital copies. Consider using a fireproof, waterproof safe for physical storage. In case of loss, a recovery process allows restoring funds on a new compatible device.


Best security practices Keep your device firmware and companion software up to date. Use hardware wallets in secure environments away from prying eyes. Beware phishing attempts and fake support channels. Never disclose private keys, PINs, or seeds to anyone.


Troubleshooting If the device fails to boot, try a different cable or port. If the device does not respond, consult the official troubleshooting guide or contact official support. Avoid third-party repair services for critical security devices.


Privacy and anonymity Hardware wallets improve custody, but privacy depends on how you use them. Use separate addresses for transactions when appropriate, and consider privacy-focused tools for enhanced anonymity.


Endnote By following these steps, you create a secure baseline for managing cryptocurrencies. Always prioritize safety, verify every interaction, and remain vigilant against evolving threats.


Advanced features and passphrase Many devices support a hidden passphrase feature that creates additional wallets derived from the same recovery seed. A passphrase can provide plausible deniability and an extra layer of security, however it also increases the risk of permanent loss if forgotten. Treat passphrases like additional seed words: write them down securely and never store them digitally. Test your recovery and passphrase restoration on a spare device before relying on them for significant funds.


Using multisignature setups For enhanced security, consider a multisignature multisig setup where multiple devices or keys must approve a transaction. Multisig reduces single points of failure and can protect against theft or loss of an individual device. Setting up multisig requires compatible wallet software and careful coordination; document all participants and recovery procedures.


Travel and on-the-go usage If you travel with your device, keep it in a protective case and never leave it unattended. Use privacy screens if you need to enter a PIN in public. Consider carrying only the devices you plan to use and keep recovery seeds in a separate secure location. Be aware of local laws and customs related to electronics and cryptographic devices when crossing borders.


Maintenance and longevity Avoid exposing your device to extreme temperatures, moisture, or magnetic fields. Clean the device gently with a dry cloth. When not in use for extended periods, store the device in a cool, dry place. Replace worn cables and accessories with official or high-quality third-party replacements.


Community and updates Join official forums, channels, or newsletters to stay informed about security advisories and best practices. Rely on manufacturer announcements for critical information, and verify announcements through multiple official channels when possible.


Glossary of common terms Seed: A human-readable set of words that represent your private keys. PIN: Personal identification number used to unlock the device. Passphrase: An optional extra secret combined with the seed to create hidden wallets. Multisig: A configuration requiring multiple signatures to authorize transactions. Firmware: Device software that controls operation and security. Companion app: Official software used to manage accounts and transactions.


Frequently asked questions What happens if I lose my device? You can restore your wallet on a compatible replacement device using your recovery seed and passphrase if used. What if I forget my PIN? If you enter an incorrect PIN too many times the device may wipe itself; restore from your seed. Can I back up my seed digitally? It is strongly discouraged to store your seed on computers, cloud storage, or photos. Are software wallets safer? Software wallets are convenient but typically less secure than dedicated hardware wallets for long term storage of large balances. Consider risk, convenience, and operational security for your needs.


Security checklist Verify tamper seals and packaging. Generate and write down your recovery seed during setup. Use a strong PIN and enable passphrase if you understand the tradeoffs. Store recovery materials offline in secure locations. Only install official firmware and verified companion software. Confirm addresses on the device screen before sending funds.


Contact and support If you encounter issues, visit the official support page or contact verified customer support channels. Provide only non-sensitive information when asking for help; never send your seed, passphrase, or PIN to support representatives. For emergency recovery assistance, follow official documented procedures only.


Closing thoughts A hardware wallet is a powerful tool for securing digital assets, but it is not a silver bullet. Good habits, careful backups, and ongoing vigilance are key. The combination of device security, personal responsibility, and verified software creates a robust approach to custody. Take time to learn features, practice recovery, and create a plan that fits your needs and risk tolerance.