How the Trezor login flow works
When you sign in with a Trezor device, the browser communicates with the hardware using a secure channel. The device itself protects your private keys — your keys never leave the hardware. During login, Trezor will display transaction or login details on its screen so you can confirm actions manually.
Step-by-step
- Connect your Trezor device to the computer using USB or an authorized mobile connection.
- Open the unlock screen and enter your device PIN on the hardware (not in the browser).
- Approve the origin (site) and requested permissions on the device screen before signing in.
- Once approved, the site will show your public addresses and balances — private keys remain protected.
Always verify on-device
Confirm addresses and any prompt directly on your Trezor screen. Phishing sites can try to inject different addresses — the device is the final arbiter.
Use a clean system
Connect from a trusted computer, avoid public Wi-Fi, and keep your OS and browser up to date to reduce attack surface.
Back up your recovery
Store your recovery seed securely offline. Never share it with anyone and do not type it into websites or apps.
Keep firmware updated
Apply official firmware updates from the Trezor website to ensure you get security fixes and improvements.