Safe & secure zKML wallet
Take control of your zKML assets with complete confidence in the Trezor ecosystem.
- Secured by your hardware wallet
- Use with compatible hot wallets
- Trusted by over 2 million customers

Send & receive your zKML with the Trezor Suite app
Send & receive
Trezor hardware wallets that support zKML
Sync your Trezor with wallet apps
Manage your zKML with your Trezor hardware wallet synced with several wallet apps.
Trezor Suite
MetaMask
Rabby
Supported zKML Network
- Ethereum
Why a hardware wallet?
Go offline with Trezor
- You own 100% of your coins
- Your wallet is 100% safe offline
- Your data is 100% anonymous
- Your coins aren’t tied to any company
Online exchanges
- If an exchange fails, you lose your coins
- Exchanges are targets for hackers
- Your personal data may be exposed
- You don’t truly own your coins
How to ZKML on Trezor
Connect your Trezor
Open a third-party wallet app
Manage your assets
Make the most of your ZKML
Trezor keeps your ZKML secure
- Protected by Secure Element
The best defense against both online and offline threats
- Your tokens, your control
Absolute control of every transaction with on-device confirmation
- Security starts with open-source
Transparent wallet design makes your Trezor better and safer
- Clear & simple wallet backup
Recover access to your digital assets with a new backup standard
- Confidence from day one
Packaging & device security seals protect your Trezor’s integrity
zKML is a groundbreaking crypto project revolutionizing digital privacy and security through innovative solutions. At its core, zKML prioritizes user privacy and security, offering cutting-edge technologies to safeguard digital interactions. Our flagship offerings include the zKOS operating system and Mobile-zKOS, designed to ensure secure communication on both desktop and mobile devices.
Core Principles: At zKML, we adhere to stringent principles centered around user privacy and security. Our core values include:
Privacy First: We believe in empowering users with complete control over their digital footprint, ensuring that their personal information remains confidential and secure.
Security by Design: Our solutions are meticulously crafted to provide robust security measures, safeguarding users against digital threats and vulnerabilities.
Innovation: We continuously push the boundaries of technology, leveraging advanced cryptographic techniques to deliver state-of-the-art solutions.