Trezor® Hardware® - Wallet | Getting Started with Trezor
Last updated
Last updated
At the core of the Trezor® Wallet® is its commitment to security. Unlike software wallets, which are vulnerable to malware and phishing attacks, hardware wallets like Trezor® store private keys offline, making them virtually immune to online threats. Here are some of the key security features that set Trezor® apart:
Offline Storage: Private keys are stored on the device itself and never exposed to the internet. This ensures that even if a user's computer is compromised, their cryptocurrencies remain safe.
Secure Element: Trezor® devices use a secure element, a tamper-resistant chip that provides an additional layer of protection against physical attacks.
PIN Protection: Access to the wallet is guarded by a PIN code. After multiple incorrect attempts, the device increases the waiting time between attempts, effectively thwarting brute-force attacks.
Recovery Seed: During setup, users are provided with a 24-word recovery seed. This seed is crucial for recovering funds if the device is lost or damaged. It should be stored securely and never shared with anyone.
Passphrase Option: For an added layer of security, users can enable a passphrase. This feature creates a hidden wallet within the device, which can only be accessed with the correct passphrase.