User data protection
Trezor hardware: built-in security
Security & safety in Trezor
Past security issues