Trezor Bridge

Secure connection for your crypto wallet

Connect your Trezor hardware wallet safely β€” every time.

Trezor Bridge is a lightweight, open-source connector that creates a secure, private channel between your Trezor device and browser-based wallets and apps. Fast installs, minimal permissions, maximum control.

End-to-end security
Encrypted local transport β€” your private keys never leave the device.
Instant pairing
Connect once and use any compatible app without repeated setup.
Automatic updates
Quiet, secure updates keep compatibility and security current.
Open & auditable
Public source code, independently auditable for transparency.
Download Bridge Documentation & FAQ

Why Trezor Bridge?

Privacy-first connection

Bridge runs locally on your machine. It never transmits private keys or transaction secrets to external servers β€” it only forwards secure commands between your browser and device.

Compatibility with major wallets

Works seamlessly with popular wallet applications and browser-based services that support Trezor’s standard APIs.

Verified & signed releases

Installations are code-signed and checksummed so you can verify authenticity before running β€” a small step that prevents compromise.

How it works β€” in three steps

1
Install Bridge
Download and run the installer for your OS. Bridge runs as a lightweight background service.
2
Connect your Trezor
Plug in your device and unlock it. Bridge pairs the browser and hardware over a local, encrypted channel.
3
Approve actions on-device
All sensitive operations (signing, key export) require manual confirmation on the Trezor device itself.

Security highlights

  • Local-only transport β€” no cloud key storage.
  • Code-signed installers and release checksums.
  • Minimal permissions: only communicates with browsers and Trezor devices.
  • Open-source codebase for community review.

FAQ

Is Bridge required to use my Trezor?
For most browser-based wallet integrations on desktop, Bridge is required to provide a secure, standard interface. Mobile and certain apps may use alternative connection methods.
Can Bridge access my private keys?
No. Private keys never leave the hardware. Bridge only relays encrypted commands; signing happens on your device.
How do I verify the installer?
Every release includes a cryptographic checksum and a digital signature. Follow the documentation steps to verify signatures before installation.
Does Bridge run on startup?
By default it may run as a background service to enable instant device detection. You can change startup behavior during installation or in settings.