How it works
Trezor Bridge runs locally and exposes a small, well-defined API that authorized browser apps can call. Instead of allowing direct raw USB access from the browser, the bridge accepts signed requests, forwards them to your connected Trezor device, and returns the signed responses. This architecture isolates private keys inside the Trezor device and minimizes attack surface on the host computer.
Installation & setup
Installing Bridge is straightforward: download the installer for your operating system, run it and follow the prompts. On first connection, you may be asked to allow the bridge to communicate with your browser — grant permission only on trusted networks and machines. When a Trezor is plugged in the browser will detect it through Bridge and request user confirmation on the physical device for any transaction.
Security considerations
The most important security guarantees come from the device itself: private keys never leave the Trezor. Bridge is intentionally minimal — it does not store keys or wallets. Always verify the device screen for transaction details and never approve actions you do not recognize.
- Only download Bridge from official sources.
- Verify TLS/HTTPS when interacting with web wallets.
- Do not use Bridge on untrusted or publicly shared machines.
Compatibility & platforms
Bridge supports major operating systems. Many web wallets and dapps expect Bridge to be present for connecting to Trezor devices; without it they may fall back to alternative connection methods, or refuse to connect.
Commonly supported browsers: Chromium-based browsers and Firefox. Make sure the browser is updated and that browser extensions which interfere with USB access are disabled.
Troubleshooting
If the device isn't recognized:
- Try a different USB cable or port.
- Restart the Bridge service or reinstall the latest package.
- Confirm the device unlocks and displays the homescreen.
- Temporarily disable VPNs or firewall rules that block local connections.
FAQ — Quick answers
Q: Does Bridge hold my seed phrase?
A: No. Seed and private keys remain securely stored on the Trezor device itself.
Q: Can I run Bridge headless on servers?
A: Bridge is designed for user machines. For advanced setups, consult official guidance and consider security implications.