Congratulations on taking the most critical step in safeguarding your digital wealth! Your hardware security device is the gold standard for independent, private asset management. To ensure maximum protection, you must only follow the **official setup procedure**. This guide mirrors the streamlined process found at the core initiation gateway. It is essential to **manually enter the official address** into your browser's address bar to prevent interacting with any deceptive or malicious websites.
This process will establish your unique secure environment, install the necessary device firmware, create your critical offline backup, and set up your protective access code. Be ready to dedicate approximately 15 minutes of uninterrupted, private time.
The very first step upon receiving your device is a vital security check. Examine the packaging meticulously. The security seals must be **perfectly intact** and show absolutely no signs of tampering, slicing, or previous opening. If there is any doubt about the packaging's integrity, **do not proceed**; contact our official support immediately for a replacement.
Next, you will need the dedicated desktop application, which serves as your secure interface for managing your digital portfolio. This application is the bridge between your device and the decentralized financial world, ensuring your secret key material remains perpetually offline.
- Obtain the Application: Navigate directly to the official platform to download the dedicated software compatible with your operating system.
- Installation: Install the application on a computer you trust and have secured.
- Initiate Setup: Launch the installed application and plug your device into your computer using the supplied cable. The application will detect your new hardware and prompt you to begin the secure setup process.
For out-of-the-box security, your device is shipped without any pre-installed operating software (firmware). This is a crucial security measure.
- Install Firmware: The desktop application will guide you to install the latest, digitally signed firmware. This process involves the application pushing the official software to the device.
- Authenticity Verification: During this stage, a crucial check occurs. The device's internal bootloader will verify the digital signature of the newly installed firmware. This process guarantees that the software running on your device is **100% official** and has not been maliciously altered.
- Device Confirmation: Follow the prompts displayed directly on your hardware device's screen to confirm the installation. The device screen is your trusted display—only information shown there can be fully trusted.
If the device or the application displays any warning regarding firmware, immediately halt the process and seek official assistance.
This is the most critical stage of the entire setup. Your wallet backup (often called a recovery phrase) is the master key to all your digital assets. If your device is ever lost, stolen, or damaged, this sequence of words is the **only way** to restore access to your funds on a new device. You will be prompted to create a new wallet.
- On-Screen Generation: A unique sequence of 12, 18, or 24 words (depending on your model) will be generated and displayed **only on your device's screen**. This ensures the words are never exposed to your computer or the internet.
- Precise Recording: Using the provided backup cards and a pen, write down the words carefully, checking the spelling and order for each one. This must be done manually, physically, and with maximum attention to detail.
- Verification: The device will then ask you to confirm a few of the words from the sequence. This confirmation step is vital—it verifies that you have recorded the words correctly. If you fail this check, you must start the backup creation process over.
🔴 ABSOLUTE SECURITY WARNING: Your wallet backup must be secured in a private, offline location (like a safe or vault). **Never** store a digital copy (photo, text file, cloud storage). **Never** share it with anyone, under any circumstances. Anyone with access to this sequence controls your assets.
The next layer of security is your unique Personal Identification Number (PIN). This code protects your device from unauthorized physical access. You must enter this code directly on the device's screen or by referring to the unique scrambled grid presented on your computer screen (depending on your model).
- Choose a Strong Code: Select a code that is easy for you to remember but impossible for others to guess. A minimum of 4 digits is required, but a longer code is always recommended.
- On-Device Entry: When prompted, enter your new PIN using the buttons or touchscreen on your device. The corresponding numbers on the companion application's grid will shuffle with every entry, preventing key-logging or screen-watching attacks.
- Confirmation: You will be asked to enter the PIN again to confirm. Remember the grid will change, requiring you to think through the new sequence.
With your wallet backup secured and your access code set, your device is fully initialized and secure. The application will guide you through the final steps:
- Name Your Device: Give your security device a unique, memorable name for easy identification.
- Activate Asset Accounts: Select the various digital asset accounts (Bitcoin, Ethereum, etc.) you wish to activate and track within the portfolio management application. You can always add more later.
- Explore the Application: You now have full access to your portfolio management application. From here, you can generate unique receiving addresses to safely move assets from exchanges or other storage methods directly to the cold storage of your Trezor. Always verify the receiving address displayed in the application with the one shown on your hardware device's screen before confirming any transaction.
You are now in complete, independent control of your digital wealth. Welcome to the highest tier of self-custody and security. Your secure journey starts here, confirmed by the steps on your device and the official application.
An Advanced Security Layer: Passphrase
For users seeking ultimate, unbreachable protection, consider activating the **passphrase** feature. Think of the passphrase as a 25th word (or more) that you keep entirely in your memory. This creates a "hidden" wallet, even if someone obtains your physical device and your wallet backup. Without the correct passphrase, the physical device and the standard wallet backup lead to an empty or decoy wallet, adding an extra, powerful layer of security.