Trezor Host Protocol (THP)
What is THP?
The Trezor-Host-Protocol (THP) is our open-source security layer that keeps all communication between your Trezor hardware wallet and host applications (mobile, desktop, and tablet) via Bluetooth or USB secure, authenticated, and fully encrypted. This means your Trezor only communicates with trusted devices (mobile, desktop, or tablet) and applications (Trezor Suite, Exodus, MetaMask ).
THP ensures secure communication so that you can trade with confidence and be sure that your Trezor remains invisible to unauthorized devices by default.
True to our philosophy, THP is open source. Its transparent design allows community and security experts to verify the protocol, creating trust and credibility.
What benefits does THP offer?
Protection against attackers
THP creates a cryptographically verified security layer that is separate from your USB or Bluetooth connection. This means no one can intercept, alter, or inject malicious messages. It completely blocks man-in-the-middle (MITM) attacks, ensuring that everything you do with your Trezor is safe and exactly as you intended. Session-specific cryptographic keys ensure your connection is independent, limiting possible attack vectors.
Total device control
Your Trezor now has its own internal verification. It will only connect to and communicate with applications and devices you have specifically approved. This instantly blocks "spoofed" or rogue computers and devices from accessing your wallet, giving you full control over which devices and apps can communicate with your Trezor.
Enhanced privacy
Your Trezor stays invisible to unauthorized hosts. It can't be passively scanned or tracked by unknown devices, ensuring your interaction is limited only to your current, trusted connection. This reduces the risk of tracking or profiling Trezor users via Bluetooth scans.
Open-Source security
Because THP is open-source, the security is built on verifiable code, not secrecy. Experts and the wider community can audit the protocol to confirm there are no hidden flaws, giving you the ultimate confidence in the security of your connection.
With THP you can use your Trezor without compromising connection security, inspiring greater user confidence and experience. The protocol simplifies user workflow by ensuring connections are automatically secured, without the need for additional manual configuration. THP delivers robust, verifiable security across all connections—wired or wireless—so you can use your Trezor with absolute certainty.