Trezor Bridge — connect your Trezor device securely to Trezor Suite and web apps
Trezor Bridge is a lightweight background service that enables secure, private communication between your Trezor hardware wallet and Trezor Suite (desktop and web). It handles USB/Bluetooth communication, enforces permissioned access, and preserves the hardware-first security model while making interactions smooth and reliable.
What is Trezor Bridge?
At its core, Trezor Bridge is a small, trusted intermediary that translates messages to and from your Trezor device. Instead of granting web pages direct access to hardware, Bridge provides a controlled channel: the Suite or browser UI requests actions through Bridge, and the device authorizes them physically. This keeps private keys and sensitive operations isolated on the hardware at all times.
Key features
Bridge abstracts low-level USB/Bluetooth protocols, presenting a simple API to Trezor Suite and supported web apps.
Only explicitly allowed origins (Trezor Suite or user-approved web apps) can communicate with the device via Bridge.
Available for Windows, macOS, and Linux — Bridge runs as a lightweight background service that the Suite and browser extensions talk to.
Bridge receives updates to support new device firmware and maintain compatibility with evolving web standards.
Security and privacy
Security remains anchored in the Trezor device. Bridge is intentionally minimalist — it acts only as a translator and does not store private keys, recovery seeds, or transactional secrets. All signing and authentication operations occur on the device itself after physical confirmation by the user.
- No key storage: Bridge never stores recovery phrases or private keys. It only passes encrypted messages between the device and the Suite or web UI.
- Origin checks: Bridge verifies the origin of requests and enforces permissions to prevent unauthorized pages from accessing your device.
- Signed firmware verification: Trezor devices validate firmware signatures internally, and Bridge ensures compatibility rather than acting on behalf of the device.
- Open-source: Bridge’s source code and protocols are available for audit by the community and security researchers to foster transparency.
Threat model
Bridge assumes that the host computer may be compromised. To mitigate this, the device requires explicit, physical confirmation for critical actions. Even if malware attempts to instruct Bridge to sign transactions, the device will display the operation details and request user approval before proceeding.
Installation and usage
Installing Trezor Bridge is straightforward. Below are the basic steps to get started; detailed platform-specific installers are available from the official Trezor download page.
- Download: Visit the official Trezor website and download the Bridge installer for your operating system.
- Install: Run the installer and follow the on-screen prompts. On macOS and Linux, you may be prompted to enter administrator credentials to register the background service.
- Run Trezor Suite: Launch Trezor Suite or open the supported web app. Bridge starts automatically and enables device detection.
- Connect your device: Plug in your Trezor device via USB. The Suite will detect it; follow on-screen instructions to manage accounts or sign transactions.
# Example: verify Bridge status on Linux systemctl --user status trezor-bridge.service
If your browser requests permission to access Bridge, approve it only if you are on a trusted site (such as the official Trezor Suite). Always download Bridge from Trezor’s official site and verify checksums when available.
Troubleshooting
Common issues are usually related to permissions, outdated Bridge versions, or USB driver problems. Try these steps if the device is not detected:
- Restart Bridge and Trezor Suite, then reconnect the device.
- Update Bridge to the latest version from the official site.
- Try a different USB cable or port; avoid USB hubs for initial setup.
- Check OS-level permissions (macOS requires security permissions for kernel extensions in some setups; Windows may require driver updates).
- Consult the support center for device-specific diagnostics and logs.
Frequently asked questions
Do I need Trezor Bridge to use my device?
For the best experience with Trezor Suite and many web apps, Bridge is recommended. Advanced users may use alternative connection methods (like direct USB access with specific browser flags) but Bridge simplifies and secures the communication flow.
Is Bridge safe to run on my computer?
Yes — Bridge is designed to be minimal and transparent. It does not access or store private keys. Its codebase is open for review and receives updates to fix security issues and improve compatibility.
How do I update Bridge?
Updates are published on the official Trezor website. Download and run the installer for your OS. Trezor Suite will also prompt when updates are available.
Download Trezor Bridge
Download installers and release notes from the official Trezor download page. Always verify the integrity of downloaded files and follow official guidance for installation and updates.