Welcome to the official starting point for your **Trezor Hardware Wallet**! You've taken the most crucial step in securing your digital assets. Forget the risks of software wallets, exchange hacks, and phishing scams. With Trezor, you hold the keys—and therefore, the ultimate control—to your Bitcoin, Ethereum, and thousands of other cryptocurrencies.
This page is your secure, verified guide to setting up your new device. **Do not download software from any other source.** True security begins here, with the genuine hardware and the official setup application: **Trezor Suite**.
Trezor Suite is the desktop and web application designed to be the central control point for your Trezor. It offers a clean, user-friendly interface that integrates advanced security features directly into your management workflow. By using Trezor Suite from the official start page, you ensure:
The first step is simple: download and install the **Trezor Suite** application for your operating system (Windows, macOS, or Linux). Once installed, launch the application and connect your physical Trezor device using the provided USB cable. The Suite will immediately recognize your device and prompt you to begin the installation process.
This is the single most important moment in your setup. Your Trezor will generate a **12-, 18-, or 24-word Recovery Seed**. This seed is the master key to your funds. **Write it down immediately** on the provided recovery cards. Follow these rules religiously:
⚠️ **NEVER take a picture of it. NEVER store it digitally (in an email, cloud, or computer file). NEVER tell anyone your seed.**
Your physical Recovery Seed is your offline, tamper-proof backup. Keep it hidden and secure. If your Trezor is lost or damaged, this seed is the only way to restore access to your cryptocurrencies.
Finally, the Suite will guide you through setting a **Personal Identification Number (PIN)**. The PIN protects your Trezor from physical theft. You will enter this PIN using a scrambled grid displayed in the Suite and on the device screen itself, a unique method that thwarts keylogging attempts. Choose a strong, memorable PIN, and your setup is complete!