Skip to main content

Backup and recovery

Your recovery seed is the master key to all your cryptocurrency. This guide covers how to safely create backups and recover your device when needed.
Your recovery seed grants complete access to your funds. Anyone with your seed can steal your cryptocurrency. Protect it carefully.

Understanding recovery seeds

A recovery seed (also called a recovery phrase or seed phrase) is a list of words that represents your device’s master private key.

Seed formats

Format: 12 or 24 wordsStructure:
  • Words from standardized BIP39 wordlist
  • 2048 possible words
  • Each word has a unique prefix
  • Checksum built into last word
Example: witch collapse practice feed shame open despair creek road again ice leastCompatibility: Works with most hardware and software wallets

How seeds work

// Simplified seed derivation
const seedToWallet = {
  recoverySeed: '12-24 words',
masterKey: 'Derived using BIP39',
accounts: 'Derived using BIP44/49/84',
addresses: 'Generated sequentially',
privateKeys: 'Used to sign transactions'
};
From your seed, everything else can be mathematically derived:
  • All private keys
  • All addresses
  • All accounts
  • Transaction signing capability
As long as you have your recovery seed, you can restore access to your funds on any compatible device.

Creating a backup

Backup creation happens during initial device setup or can be performed later.

Initial device setup backup

1

Start setup

Connect your new Trezor and follow the setup wizard in Suite.
2

Choose backup type

Select between:
  • Standard backup (12/24 words)
  • Shamir backup (multiple shares) - T/Safe 3 only
3

Write down seed

Your device displays words one at a time:
  • Write each word on the recovery seed card
  • Write clearly and legibly
  • Double-check each word
  • Never photograph or store digitally
Write on paper only. Never type into a computer or take a photo.
4

Verify backup

The device asks you to confirm random words from your backup:
  • Read from your written card
  • Select the correct word on device
  • Verifies you wrote down correctly
5

Store securely

Place your written seed in secure storage:
  • Fireproof/waterproof container
  • Safe deposit box
  • Multiple locations (for redundancy)

Backup verification

After creating a backup, verify it’s correct:
1

Access backup check

Go to Settings → Device → Backup and click Check backup.
2

Follow prompts

Device will ask you to confirm specific words from your backup.
3

Success confirmation

If successful, you’ve confirmed your backup is valid.
Perform backup verification regularly, especially after writing down your seed.

Pre-backup checklist

Before creating a backup:
  • No cameras or security cameras watching
  • No one looking over your shoulder
  • Close curtains/blinds
  • Consider using a privacy screen
  • Recovery seed card (provided with device)
  • Or durable paper
  • Working pen (test it)
  • Secure storage location identified
  • Safe deposit box
  • Fireproof safe
  • Multiple geographic locations
  • Consider metal backup for durability

Recovering your device

Device recovery restores your wallet using your recovery seed.

When to recover

You need to recover when:
  • Setting up a new device with existing seed
  • Restoring after device wipe
  • Replacing lost or stolen device
  • Moving to different Trezor model
  • Testing your backup (recommended)

Standard recovery process

1

Start recovery

During device setup, select Recover wallet instead of Create new wallet.
2

Choose word count

Select the number of words in your seed:
  • 12 words (most common)
  • 18 words (rare)
  • 24 words (maximum security)
3

Enter seed words

Model One:
  • Type each word using Suite interface
  • Words auto-complete from BIP39 wordlist
  • Device validates each word
Model T/Safe 3:
  • Type directly on device touchscreen
  • More secure (no computer involvement)
  • Words auto-complete on device
4

Validation

Device validates the seed:
  • Checks all words are valid BIP39 words
  • Verifies checksum
  • Creates wallet if valid
5

Set new PIN

Create a new PIN for the recovered device.
PIN is device-specific and not part of the recovery seed. You can set any PIN you want.
6

Account discovery

Suite automatically discovers your accounts and transaction history.

Advanced recovery (Model T/Safe 3)

For maximum security, use Advanced Recovery:
  1. Enable in recovery options
  2. Seed entry happens entirely on device
  3. No computer involvement at all
  4. Protects against keyloggers and screen capture malware
Always use Advanced Recovery on Model T/Safe 3 for maximum security.

Shamir Backup recovery

Recovering from Shamir shares:
1

Start Shamir recovery

Select Recover using Shamir Backup during setup.
2

Enter threshold shares

Enter the required number of shares:
  • Device prompts for each share
  • Only need threshold amount (e.g., 3 of 5)
  • Order doesn’t matter
3

Validate and recover

Device reconstructs seed from shares and creates wallet.
You don’t need all Shamir shares, just the threshold amount you configured during setup.

Backup storage best practices

Physical storage

Pros:
  • Included with device
  • Easy to create
  • No special equipment needed
Cons:
  • Vulnerable to fire/water
  • Can fade over time
  • Easily damaged
Best practices:
  • Use quality paper
  • Store in waterproof bag
  • Keep in fireproof container
  • Create multiple copies
Pros:
  • Fireproof (up to high temperatures)
  • Waterproof
  • Extremely durable
  • Long-lasting
Cons:
  • Additional cost
  • Requires metal stamping or engraving
  • More obvious (less discreet)
Options:
  • Steel plates
  • Titanium plates
  • Stamped metal
  • Engraved plates
Pros:
  • Bank-level security
  • Fireproof vault
  • Protected from theft
Cons:
  • Annual fees
  • Limited access hours
  • Not accessible in bank emergency
Use for:
  • Primary backup storage
  • High-value holdings
  • Long-term storage

Geographic distribution

For maximum security, distribute backups:
Scenario: 3-of-5 Shamir backup

Location 1 (Home safe): Share 1, Share 2
Location 2 (Bank vault): Share 3, Share 4  
Location 3 (Family member): Share 5

Benefit: Need to access 2 of 3 locations to recover
Never store all backup materials in a single location. A fire, flood, or theft could destroy all copies.
Never store recovery seeds digitally:
  • No photos
  • No computer files
  • No cloud storage
  • No password managers
  • No encrypted files
Digital storage creates attack vectors:
  • Malware can steal files
  • Backups can be hacked
  • Cloud accounts can be compromised
  • Devices can be stolen
The only digital exception: Encrypted password managers for passphrase reference (not the seed itself), and only if you fully understand the risks.

Recovery testing

Regularly test your recovery process to ensure your backup works.

Safe testing methods

Use Suite’s built-in verification:
  1. Settings → Device → Backup
  2. Click Check backup
  3. Confirm words on device
  4. No funds moved, completely safe
Never test recovery on your main device unless you’re prepared to lose access if something goes wrong. Use dry run or secondary device.

Recovery security

Protecting during recovery

Recovery is a sensitive operation:
Perform recovery in private
Ensure no cameras or observers
Use Advanced Recovery on Model T/Safe 3
Verify Suite is legitimate before recovering
Never enter seed into websites
Consider using offline computer for recovery

Handling recovery failures

Causes:
  • Typo in word entry
  • Wrong word from similar wordlist
  • Checksum failure
Solutions:
  • Double-check each word carefully
  • Verify word spelling
  • Try alternate spellings if handwriting unclear
  • Consult BIP39 wordlist
Causes:
  • Correct seed but different passphrase
  • Seed from different device
  • Using wrong derivation paths
Solutions:
  • Verify passphrase (case-sensitive)
  • Check if this is the correct seed
  • Try without passphrase first
Check:
  • Correct passphrase applied?
  • All account types discovered? (Native SegWit, SegWit, Legacy)
  • All networks enabled?
  • Backend connection working?
Action:
  • Re-run account discovery
  • Enable all account types
  • Verify blockchain connection

Special recovery scenarios

Recovering with passphrase

If you used passphrases:
  1. Recover with standard seed first
  2. After recovery, apply passphrase
  3. Enter exact passphrase (case-sensitive)
  4. Suite discovers passphrase wallet accounts
Passphrases must be exact. Even a single character difference creates a completely different wallet.

Cross-device recovery

Recovering on different Trezor models:
  • One → T/Safe 3: Fully compatible
  • T/Safe 3 → One: Compatible unless using model-specific features
  • Shamir → Standard: Not compatible (Shamir only on T/Safe 3)

Emergency recovery

If Suite is unavailable:
  1. Seeds are BIP39 standard (except Shamir)
  2. Can recover in other BIP39 wallets
  3. Use trusted wallet software
  4. Consider: Electrum, Ledger Live, etc.
Standard BIP39 seeds work with most hardware and software wallets. You’re not locked into Trezor.

Inheritance planning

Ensure your heirs can access funds if needed:
1

Document access method

Write clear instructions:
  • Where backup is stored
  • How to use recovery seed
  • Passphrase location (if separate)
  • Trusted advisor to contact
2

Secure documentation

  • Store instructions separately from seed
  • Use sealed envelope
  • Include in estate planning
  • Update regularly
3

Consider multisig or Shamir

  • Distribute shares to multiple parties
  • Requires threshold for access
  • Prevents single point of failure
4

Educate trusted parties

  • Teach basic recovery process
  • Don’t share actual seed yet
  • Provide general guidance
  • Update as needed
Consider consulting with an estate attorney familiar with cryptocurrency to ensure proper inheritance planning.

Backup checklist

Recovery seed written down clearly
Backup verified using device check
Multiple copies created (if using paper)
Stored in secure, separate locations
Fireproof/waterproof protection
Passphrase documented separately (if used)
Recovery tested (dry run or secondary device)
Family members know where to find instructions
Regular backup verification scheduled
Metal backup created for large holdings

Security

Security best practices and threat protection

Device settings

Configure device during and after recovery

Wallet management

Managing recovered wallets and passphrases

Firmware updates

Update firmware after device recovery

Build docs developers (and LLMs) love