すべての記事
How Trezor keeps you safe
Make your security bulletproof
- Security & Safety in TrezorExplore security features of all Trezor models
- Trezor hardware: built-in securityLearn what’s inside your Trezor device
- Connect Trezor Suite to your nodeUse a custom Blockbook or Electrum server for more privacy and control
- Entropy checkRandomness check ensures a secure backup
- MEV protection in Trezor Suite
- Past security issuesSee how past vulnerabilities were addressed Emphasizes resolution and responsibility
- Secure Elements in Trezor Safe devicesLearn how the Secure Element enhances security
- Trezor firmware authenticity check
- Trezor firmware authenticity check failed
- Trezor Firmware hash checkEnsure your firmware is unmodified and safe
- Trezor firmware revision checkEnsure your Trezor isn’t counterfeit
- Trezor Model One Firmware installation progress check
- Trezor Safe device authentication checkCheck your device is genuine before use
- Unlocking the bootloader on Trezor Safe devicesUnderstand security trade-offs before unlocking
- Tor in Trezor SuiteTor keeps network activity anonymous
お困りですか?お任せください。
私たちのサポートチームとコミュニティが、いつでもあなたをサポートします。