Skip to main content

Security

Trezor Suite is designed with security as the top priority. This guide covers the security features built into Suite and best practices for keeping your cryptocurrency safe.

Core security principles

Trezor’s security model is based on several fundamental principles:

Hardware isolation

Your private keys never leave the Trezor device:
  • Keys are generated on the device
  • All signing happens on the device
  • Suite only receives signed transactions
  • No software can extract your private keys
Even if your computer is compromised by malware, your funds remain safe as long as you verify transaction details on your Trezor device screen.

Device verification

All critical information must be verified on the device screen:
Receiving addresses
Transaction amounts and recipients
Firmware fingerprints
Passphrase entry (when using device entry)
Never trust information shown only in Suite. Always verify on your device screen.

Open source transparency

Both Trezor firmware and Suite are open source:
  • Code is publicly auditable
  • Security researchers can review
  • Community can verify there are no backdoors
  • Regular security audits are performed

PIN protection

Your PIN is the first line of defense against unauthorized device access.

Setting a strong PIN

1

Length matters

Use at least 6 digits. Longer PINs are more secure.
  • Minimum: 4 digits (not recommended)
  • Recommended: 6-9 digits
  • Maximum: 50 digits (firmware 1.10.0+)
2

Avoid obvious patterns

Don’t use:
  • Sequential numbers (123456)
  • Repeated digits (111111)
  • Birth dates
  • Common PINs (1234, 0000)
3

Randomize PIN layout

The PIN keypad layout randomizes with each entry, preventing keyloggers from capturing your PIN.

PIN entry system

Suite displays a numbered grid (1-9) that corresponds to the positions on your device:
Suite displays:        Device shows:
[7] [8] [9]           [•] [•] [•]
[4] [5] [6]           [•] [•] [•]
[1] [2] [3]           [•] [•] [•]
Look at your device to see which numbers are where, then click the corresponding positions in Suite.
The randomized layout means even someone watching your screen can’t determine your actual PIN.

PIN attempts and wipe

To prevent brute-force attacks:
  • Each failed PIN attempt increases delay
  • After 16 failed attempts, the device wipes itself
  • Delay doubles after each failure (exponential backoff)
// PIN attempt delays
const attemptDelays = {
  1: '0 seconds',
  2: '2 seconds',
  3: '4 seconds',
  4: '8 seconds',
  10: '8.5 minutes',
  15: '4.3 hours',
  16: 'Device wipes'
};
After 16 failed PIN attempts, your device wipes all data. You’ll need your recovery seed to restore access to your funds.

Passphrase protection

Passphrases add an extra security layer beyond your recovery seed.

How passphrases work

A passphrase modifies your recovery seed to create an entirely different wallet:
Recovery seed + "" (empty)        → Standard wallet
Recovery seed + "MyPassphrase"    → Hidden wallet 1
Recovery seed + "AnotherOne"      → Hidden wallet 2
Each unique passphrase creates a separate wallet with different:
  • Addresses
  • Private keys
  • Transaction history
  • Balances

Plausible deniability

Passphrases enable plausible deniability:
  1. Keep small amounts in your standard wallet
  2. Store larger amounts in passphrase-protected hidden wallets
  3. If coerced, reveal only your standard wallet
There’s no way to prove a passphrase-protected wallet exists. Any passphrase is valid and creates a wallet, even if it’s empty.

Passphrase best practices

  • Long phrases are better than short passwords
  • Mix words, numbers, and symbols
  • Make it memorable but not guessable
  • Example: “My grandmother’s garden has 47 roses!”
  • Write down offline
  • Store separately from recovery seed
  • Never store digitally
  • Consider using a password manager for reference
  • On device (most secure): Enter on Trezor screen
  • In Suite (convenient): Type in Suite interface
Device entry is recommended for maximum security.
  • Create passphrase wallet
  • Write down passphrase
  • Eject and reconnect
  • Access wallet with passphrase multiple times
  • Only then transfer significant funds
Passphrases cannot be recovered if forgotten. There is no “forgot passphrase” option. Your funds will be permanently inaccessible.

Wipe code

A wipe code provides an emergency self-destruct mechanism.

What is a wipe code?

A wipe code looks like a PIN but wipes the device when entered:
  • Acts as a PIN alternative
  • Immediately wipes device when used
  • Appears as failed PIN attempt to attacker
  • Requires recovery seed to restore funds

When to use

Use a wipe code for scenarios like:
  • Threat of physical coercion
  • Device seizure by authorities
  • Emergency situations requiring quick data destruction
Entering the wipe code immediately erases all device data. Ensure you have your recovery seed backed up before setting a wipe code.

Device security features

Anti-tampering measures

  • All firmware is cryptographically signed
  • Multiple signatures required
  • Bootloader verifies signatures before installation
  • Warning shown for unofficial firmware

Device authenticity check

Verify your device is genuine:
1

Check packaging

  • Holographic seals intact
  • Official Trezor packaging
  • No signs of tampering
2

Verify in Suite

Navigate to Settings → Device → Check device authenticity
3

Follow verification

Suite guides you through device verification using cryptographic challenge-response.
Authenticity checks verify your device was manufactured by Trezor and hasn’t been tampered with.

Suite security features

Discreet mode

Hide sensitive information in Suite:
  1. Enable via settings or top-right icon
  2. Balances shown as ••••
  3. Transaction amounts hidden
  4. Protects privacy when sharing screen

Tor integration

Use Tor to hide your IP address:
  1. Go to Settings → Application → Tor
  2. Enable Tor routing
  3. All Suite communication routes through Tor network
  4. Prevents IP-based tracking
Tor is currently available in Suite Desktop only.

Backend privacy

Suite connects to blockchain backends to fetch data:
  • Default: Trezor-operated backends
  • Custom: Use your own blockchain node
  • Tor: Route through Tor for IP privacy
For maximum privacy, run your own Bitcoin node and configure Suite to use it.

Protecting against attacks

Phishing protection

Phishing is the most common attack vector:
Only download Suite from trezor.io
Verify HTTPS and certificate before entering sensitive info
Bookmark official Trezor sites
Never enter recovery seed into any website or software
Ignore unsolicited support messages (Trezor never initiates contact)
Never enter your recovery seed anywhere except your Trezor device during recovery. No legitimate service will ever ask for your seed.

Malware protection

Even with malware, Trezor keeps funds safe:
  • Address verification: Always check addresses on device
  • Amount verification: Confirm amounts on device screen
  • Transaction details: Review all outputs on device
Attack: Malware replaces copied addressesProtection: Always verify addresses on device screen before sending
Attack: Malicious Suite clone steals dataProtection: Download only from trezor.io, verify signatures
Attack: Malware screenshots recovery seedProtection: Never display seed on computer, use device entry for passphrases

Physical security

Store device in secure location
Don’t leave device connected when not in use
Use device entry for passphrases when possible
Consider using SD card protection (Model T/Safe 3)
Store recovery seed separately from device

Recovery seed security

Your recovery seed is the master key to your funds.

Protecting your seed

1

Write it down

  • Use the provided recovery seed card
  • Write clearly and legibly
  • Double-check each word
  • Never photograph or store digitally
2

Verify backup

  • Use device’s backup check feature
  • Verify you wrote down correct words
  • Test recovery on a secondary device if possible
3

Secure storage

  • Fireproof/waterproof container
  • Safe deposit box
  • Multiple geographically separated locations
  • Consider metal backup (fireproof)
4

Split security

  • Store seed separately from device
  • Store seed separately from passphrase
  • Don’t keep all in one location
Anyone with access to your recovery seed (and passphrase, if used) can steal your funds. Protect it as carefully as cash.

Advanced: Shamir Backup

Shamir Backup splits your seed into multiple shares:
  • Create 2-16 shares
  • Set threshold (e.g., 3 of 5 shares needed)
  • More flexible than single seed
  • Only available during setup
Shamir Backup is only available on Trezor Model T and Safe 3.

Security checklist

Essential security practices

Set a strong PIN (6+ digits)
Create secure backup of recovery seed
Enable passphrase for significant holdings
Verify all addresses on device screen
Keep firmware updated
Only use official Suite from trezor.io
Never share recovery seed or passphrases
Use Discreet mode when needed
Store recovery seed securely offline
Test recovery before funding device

Advanced security measures

Use Tor for IP privacy
Run your own blockchain node
Use CoinJoin for transaction privacy
Enable SD card protection (T/Safe 3)
Set up wipe code
Use multiple devices for different purposes
Implement Shamir Backup
Regularly verify device authenticity

Incident response

If device is lost or stolen

1

Don't panic

Your funds are safe if you have:
  • Recovery seed
  • Passphrase (if used)
  • Strong PIN on device
2

Secure new device

  • Purchase new Trezor
  • Recover using your seed
  • Create new PIN
3

Move funds

  • Generate new accounts
  • Transfer funds to new addresses
  • Old device addresses are compromised

If you suspect compromise

  1. Stop using the device immediately
  2. Transfer funds to a new wallet with new seed
  3. Investigate the potential compromise
  4. Update security practices based on findings
If you suspect your recovery seed is compromised, transfer funds to a new wallet with a new seed immediately.

Backup and recovery

Creating and verifying device backups

Device settings

Configure PIN, passphrase, and security features

Wallet management

Managing standard and hidden wallets

CoinJoin privacy

Enhanced transaction privacy

Build docs developers (and LLMs) love