Safe & secure Wrapped Accumulate wallet
Take control of your Wrapped Accumulate assets with complete confidence in the Trezor ecosystem.
- Secured by your hardware wallet
- Use with compatible hot wallets
- Trusted by over 2 million customers

Send & receive your Wrapped Accumulate with the Trezor Suite app
Send & receive
Swap
Trezor hardware wallets that support Wrapped Accumulate
Sync your Trezor with wallet apps
Manage your Wrapped Accumulate with your Trezor hardware wallet synced with several wallet apps.
Trezor Suite
MetaMask
Rabby
Supported Wrapped Accumulate Networks
- Ethereum
- Arbitrum One
Why a hardware wallet?
Go offline with Trezor
- You own 100% of your coins
- Your wallet is 100% safe offline
- Your data is 100% anonymous
- Your coins aren’t tied to any company
Online exchanges
- If an exchange fails, you lose your coins
- Exchanges are targets for hackers
- Your personal data may be exposed
- You don’t truly own your coins
How to WACME on Trezor
Connect your Trezor
Install Trezor Suite

Transfer your WACME

Make the most of your WACME
Trezor keeps your WACME secure
- Protected by Secure Element
The best defense against both online and offline threats
- Your tokens, your control
Absolute control of every transaction with on-device confirmation
- Security starts with open-source
Transparent wallet design makes your Trezor better and safer
- Clear & simple wallet backup
Recover access to your digital assets with a new backup standard
- Confidence from day one
Packaging & device security seals protect your Trezor’s integrity
The Accumulate Protocol (“Accumulate”) is an identity-based, Delegated Proof of Stake (DPoS) blockchain designed to power the digital economy through interoperability with Layer-1 blockchains, integration with enterprise tech stacks, and interfacing with the World Wide Web. Accumulate bypasses the trilemma of security, scalability, and decentralization by implementing a chain-of-chains architecture in which digital identities with the ability to manage keys, tokens, data, and other identities are treated as their own independent blockchains. This architecture allows these identities, known as Accumulate Digital Identifiers (ADIs), to be processed and validated in parallel over the Accumulate network. Each ADI also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand the utility of multi-signature transactions. A two token system provides predictable costs for enterprise users, while anchoring all transactions to Layer-1 blockchains provides enterprise-grade security to everyone.