Device Authenticity Verification
Trezor Suite includes built-in device authenticity verification to ensure users have genuine Trezor hardware and detect potential tampering.Overview
Device authenticity checks protect against:Counterfeit Devices
Detect fake Trezor devices
Supply Chain Attacks
Identify tampered devices
Firmware Modifications
Verify official firmware
Bootloader Integrity
Confirm authentic bootloader
Verification Methods
Multiple layers of authenticity verification:1. Bootloader Verification
Checks bootloader authenticity:Bootloader is locked during manufacturing and cannot be modified without bricking the device.
2. Firmware Signature
Verifies firmware is officially signed:3. Device Certificate
T2T1 and newer models include device certificate:4. Secure Element (T2B1, T3)
Newest models with secure element:- Attestation: Cryptographic proof from secure chip
- Unique keys: Each device has unique attestation key
- Certificate chain: Verifiable back to manufacturer root
- Tamper detection: Secure element detects physical attacks
Verification Flow
Automatic Checks
Suite automatically verifies on device connection:Manual Verification
Users can manually trigger verification:- Go to Device Settings
- Click “Check device authenticity”
- Wait for verification process
- Review detailed results
Verification Results
Status Indicators
- Authentic
- Warning
- Failed
✅ Device is authentic
- All checks passed
- Official Trezor device
- No signs of tampering
- Safe to use
Detailed Report
Comprehensive verification report:Physical Security Checks
Before connecting device:Hologram Seal
Hologram Seal
- Check holographic sticker on packaging
- Should be intact and not tampered
- Unique holographic pattern
- Difficult to replicate
Packaging Integrity
Packaging Integrity
- Original sealed packaging
- No signs of opening/resealing
- Official Trezor branding
- Include authentic documentation
Device Appearance
Device Appearance
- Compare with official photos
- Check build quality
- Verify button/screen placement
- Inspect for unusual modifications
Purchase Source
Purchase Source
- Buy from official Trezor Shop or authorized resellers
- Avoid third-party marketplaces
- Never buy pre-owned devices
- Verify reseller authorization
Bootloader Mode Verification
Bootloader mode shows authenticity info:T2T1 Bootloader Screen
- VendorHash OK: Bootloader verifies firmware vendor
- FirmwareHash OK: Bootloader verifies firmware integrity
Warning Screen
If verification fails, bootloader shows warning:Firmware Installation Security
Official Firmware Only
Suite only installs official firmware:Signature Scheme
Multi-signature verification:- M-of-N signatures: Require multiple valid signatures
- Different keys: Held by different Trezor developers
- Threshold: Typically 2-of-3 or 3-of-5
- Revocation: Compromised keys can be revoked
Implementation Details
Device Authenticity Package
Suite Common Integration
Warning UI
When verification fails, Suite displays prominent warning:Warning Modal
Banner Warning
Persistent warning if user continues:Support Integration
Help users with failed verification:Contact Support
Direct support access:Documentation
Links to help articles:- How to verify device authenticity
- What to do if verification fails
- How to identify counterfeit devices
- Where to buy authentic Trezor devices
Best Practices
For Users
- Buy only from official sources
- Check physical security features
- Verify device on first connection
- Report suspicious devices
- Never ignore authenticity warnings
For Developers
- Always verify before allowing usage
- Implement comprehensive checks
- Clear warning messages
- Log verification results
- Provide support contact
Troubleshooting
Verification Failed on Genuine Device
Verification Failed on Genuine Device
Rare false positives possible:
- Update Suite to latest version
- Update device firmware
- Try different USB cable/port
- Contact support with verification report
Cannot Verify Bootloader
Cannot Verify Bootloader
Some scenarios:
- Very old firmware versions
- Device in wrong mode
- Communication issues
- Try firmware update first
Verification Takes Long Time
Verification Takes Long Time
Normal duration:
- Simple checks: 1-2 seconds
- Full verification: 5-10 seconds
- If longer, check USB connection
Security Implications
Risks of Counterfeit Devices
Protection Measures
Authenticity verification provides:- Early detection: Identifies counterfeit before use
- User education: Explains risks clearly
- Support path: Direct channel to Trezor support
- Continuous monitoring: Re-verification on updates