How to log in to your Trezor
Trezor itself does not use a cloud username/password. Access to accounts is performed locally via the device (PIN + optional passphrase) together with a compatible wallet application such as Trezor Suite. Follow these steps to safely sign in and manage funds.
Quick step-by-step login
- Open your wallet app: Launch Trezor Suite (desktop or web) or a supported third-party wallet you trust.
- Connect your Trezor device: Use the official USB cable to plug your device into your computer or supported mobile adapter.
- Confirm device fingerprint: When prompted, verify the short device fingerprint on the Trezor screen matches the fingerprint shown in the app. This helps ensure you are communicating with your genuine device.
- Enter your PIN on the device: Type your PIN using the device's touchscreen/buttons. Never enter your PIN into your computer or phone — always use the device input.
- (Optional) Enter a passphrase: If you use a passphrase (a 25th secret word), enter it when requested. This unlocks any hidden wallet associated with that passphrase.
- Approve account access: The app will display your accounts once the device is unlocked; verify addresses and transaction details on your Trezor display before approving.
Logging in on mobile
Trezor supports mobile usage via Trezor Suite mobile or compatible apps that implement WebUSB, WebHID, or Bluetooth bridges (where supported). Use official mobile guidance and verify addresses on the physical device. For iOS/Android, a USB-C/Lightning adapter or supported cable may be required.
PIN vs Passphrase — quick reminder
- PIN: Protects the device from local access. It is requested each time you connect the device.
- Passphrase (optional): An additional secret that derives separate hidden wallets from your seed. Losing a passphrase means losing access to funds in that hidden wallet — there is no recovery without it.
Signing transactions
When you send funds or sign messages, the transaction details (recipient address, amount, fees) must be shown on your Trezor device. Only approve the transaction if the details on the device match what you expect. This prevents altered or malicious transactions that could be injected by compromised software.