What is Trezor Model T?
The Trezor Model T is the next-generation cryptocurrency hardware wallet, designed to be your universal vault for all of your digital assets. Store and encrypt your coins, passwords and other digital keys with confidence.
Invented for your digital independence.
Securing your digital assets has never been more straightforward, be it cryptocurrencies, passwords, or other digital keys. With Trezor, you own your data. It is so much more than a security token. It is your wallet, your keychain, and your digital safe.
You own your data.
Trezor keeps your keys safe.
Your digital keys are the access keys to your coins and other data. Trezor stores these keys for you, and allows you to use them safely. Your keys never leave the device, as the device is completely isolated.
Always know what you are doing.
Designed for your confidence and peace of mind, Trezor allows you to be certain even during complex operations. The Model T features a touchscreen, giving you an intuitive and convenient interface to verify and approve all operations.
Easily back up your entire wallet.
To make backup easier, we helped to create the industry standards for recovery seeds (BIP32, BIP39, BIP44, SLIP39), meaning you can simply recover your entire wallet by using the 12-word recovery seed if you lose your device. Trezor Model T is also the first hardware wallet in the world to implement Shamir Backup (SLIP39).
Store your passwords safely.
Passwords are individually locked within Trezor Password Manager, using your digital keys. Secrets are released one by one, and only after you physically confirm on your Trezor.
Reinforce your accounts with U2F.
The Model T can also serve as your U2F hardware token. Ordinary security tokens lack a display, which means that you can never be certain about what you are approving. Trezor utilizes its Trusted Display to fully inform you about the authentication request before you approve it, by displaying the service you are logging in to.
5-star customer support.
Experts ready to help you at all times. Our dedicated Support Team is reinforced every year, with our specialists working day and night to answer your inquiries.
Audited by security researchers, verified by its track record. We do not have anything to hide from you; we follow the open-source ethos.