Getting ready — physical and digital checklist
Box and device inspection
Confirm the packaging seal is intact and the device shows no physical tamper marks. Only start the device if everything looks genuine. If anything seems off, contact support before proceeding.
Required items
- Trézor device and official USB cable
- Computer or compatible mobile device with a secure internet connection
- Pen and the provided recovery card (or a durable backup)
- Private, distraction-free workspace
Security reminder (short)
Never share your recovery seed. Never type it into a website, phone, or chat. The device will display the seed on its screen — record it carefully and store it offline.
Walkthrough — Starting the device step-by-step
Step 1: Connect and power
Connect your Trézor to the computer using the official cable. The device will boot and display a welcome screen. If you see anything unexpected, unplug and verify the package before continuing.
Step 2: Firmware & authenticity
The device may ask to update firmware. Only accept updates initiated by the official website. Verify the authenticity prompt and confirm the device identity through the recommended verification flow.
Step 3: Create a new wallet
Choose “Create new” on the device. A recovery seed (typically 12–24 words) will be generated and displayed. Write these words in order on your recovery card — do not take photos or store them digitally.
Step 4: Confirm seed
The device will ask you to confirm several words to ensure the seed was recorded correctly. Confirm on the device only — do not confirm through apps or websites.
Best practices & recovery
Backing up and splitting seed
Consider geographically separating backups (e.g., one copy in a safe and another with a trusted family member). Use metal backup options for resilience against fire and water.
Using passphrase (optional advanced)
A passphrase is an additional secret appended to the seed. It increases security but comes with extra responsibility: losing the passphrase means losing access.
Routine checks
Periodically verify the device’s firmware and confirm no suspicious activity on associated accounts. Keep the device firmware up-to-date and only use official apps and web portals.