Trezor Bridge

Secure connection for your Trezor hardware wallet

Official Bridge Service

How Trezor Bridge Works

Trezor Bridge is a local application that enables secure communication between your Trezor hardware wallet and compatible desktop or web applications. It ensures that private keys never leave the device and that all operations are verified on-device.

Local-only communication

Bridge only listens on localhost and does not transmit sensitive data over the internet.

Encrypted Requests

All commands and transaction data are encrypted and require on-device confirmation before signing.

Cross-platform

Available for Windows, macOS, and Linux with minimal installation overhead.

Developer-friendly

Exposes documented local APIs for secure integration with applications.

Typical Workflow

  1. Install Trezor Bridge and start the service on your computer.
  2. Connect your Trezor device via USB.
  3. Open a Trezor-compatible web app; it will request local access via Bridge.
  4. Review transaction details on the device and approve to sign.
  5. The signed transaction is sent back to the app — keys never leave the device.
Note: Bridge does not store private keys or transaction data. It only relays encrypted requests locally.

Security Considerations

Device Key Security

  • Private keys remain on the device and never leave it.
  • All operations require physical confirmation on the Trezor.
  • Bridge only forwards encrypted requests to the device.

Privacy & Operation

  • Bridge runs locally and does not transmit personal data.
  • Logs are stored locally for troubleshooting.
  • Always download official Bridge packages and verify checksums.

Troubleshooting

  • If your device is not detected, reconnect the USB cable or restart the Bridge service.
  • Ensure drivers are installed on Windows or permissions granted on macOS.
  • Check official support documentation for persistent errors.

Developer Info

Trezor Bridge exposes a local API to allow secure integration with web and desktop apps. Always follow the principle of least privilege and require on-device verification for all sensitive operations.