Security & Safety in Trezor
The purpose of this article is to give a detailed account of the software specifications and security features used by the Trezor Safe 5, Trezor Safe 3, Trezor Model T, and Trezor Model One.
The software used in Trezor devices has always been open-source to be fully auditable. Everyone can look at the code used in Trezor devices and verify its integrity, look for vulnerabilities, or suggest improvements and integrations.
We made Trezor fully transparent to eliminate the inherent need for trust and to share as much of our knowledge and ideas with the broader community.
See the SatoshiLabs Security Philosophy Manifesto for more details on our principles and motivations.
You can verify and build the software used in Trezor devices. See the source code at Trezor GitHub:
You can also refer to our Developer's Guide.
Trezor Safe 7
Operating Systems
Trezor Safe 7 uses several layers of code that work together to check authenticity, enforce security rules, and protect your private keys. These layers load one another in a strict order to ensure only trusted code ever runs on the device.
Boardloader
The boardloader is the write protected, factory embedded code that sits at the foundation of Trezor Safe 7. Its job is to verify the bootloader and prove that the device is genuine.
The boardloader on Trezor Safe 7 is also the first hardware wallet implementation that can verify post quantum signatures, preparing the device for future upgrades when quantum safe cryptography becomes standard.
The boardloader cannot be updated, changed, or removed.
Boardloader key points:
Embedded and unmodifiable
Verifies the bootloader
Uses post quantum verification
Acts as the root of trust for the device
Bootloader
The bootloader installs, updates, and checks the firmware. If the firmware is modified or unofficial, the device will warn the user before running it.
If the device is started without valid firmware, or both buttons are pressed during startup, the bootloader enters firmware update mode.
Bootloader key points:
- Installs, updates, and checks firmware integrity
- Verifies firmware signatures
- Is updatable
Firmware
The firmware is the main software that operates Trezor Safe 7. It handles the interface, wallet logic, security checks, and device features. Any firmware update must be physically confirmed on the device by the user.
Firmware key points:
- Runs all wallet functions
- Verified by the bootloader before execution
- Updated regularly to improve security and usabilit
Keeping your device updated ensures you always have the latest protections.
Authorization
Physical Access
Trezor Safe 7 uses a dual secure element architecture for stronger physical security. It includes:
- TROPIC01, the first open source secure element
- OPTIGA Trust M, used in previous Trezor Safe devices
These chips work together to protect PIN processing, enforce attempt limits, and guard secret material, making physical attacks on the device far more difficult.
Learn more here: Dual Secure Elements in Trezor Safe 7
Trezor Safe 5
Operating Systems
There are multiple layers of code ensuring the legitimacy and safety of operations executed by your device.
Boardloader
The boardloader is the write-protected, embedded-immutable code of the device. It loads and checks the integrity of the bootloader. It prevents code-based attacks (e.g., BadUSB) and ensures only verified embedded code runs on the device.
The boardloader cannot be updated, modified, or removed.
Boardloader key points:
- Embedded and unmodifiable
- Loads the bootloader and checks its integrity
Bootloader
The bootloader installs, updates, and checks the firmware. If unofficial firmware is detected, the device displays a warning.
If both buttons are pressed or no firmware is present, the device starts in firmware update mode.
Bootloader key points:
- Uploads, updates, and checks firmware integrity
- Is updatable
- Signatures checked by the bootloader
Firmware
Firmware operates the device, executes functions, and maintains security. Updates require physical confirmation on the device.
Firmware key points:
- Operates the device
- Checked by the bootloader
- Regularly updated
Keep your device updated with the latest firmware to counter security threats.
Authorization
Physical Access
Trezor devices implement several safety measures to prevent unauthorized access. Notably, Trezor Safe 5 has a dedicated OPTIGA™ Trust M Secure Element, which protects highly sensitive information from hardware and software attacks.
Learn more about Secure Elements in Trezor Safe Devices: Secure Element in Trezor Safe Devices
Trezor Safe 3
Operating Systems
There are multiple layers of code ensuring the legitimacy and safety of operations executed by your device.
Boardloader
The boardloader is the write-protected, embedded-immutable code of the device. It loads and checks the integrity of the bootloader.
Boardloader key points:
- Embedded and unmodifiable
- Loads the bootloader and checks its integrity
Bootloader
The bootloader installs, updates, and checks the firmware. If unofficial firmware is detected, the device displays a warning.
Bootloader key points:
- Uploads, updates, and checks firmware integrity
- Is updatable
- Signatures checked by the bootloader
Firmware
Firmware operates the device, executes functions, and maintains security.
Firmware key points:
- Operates the device
- Checked by the bootloader
- Regularly updated
Keep your device updated with the latest firmware to counter security threats.
Trezor Model T
Operating Systems
There are multiple layers of code ensuring the legitimacy and safety of operations executed by your device.
Boardloader
The boardloader is a write-protected, embedded-immutable code that loads and checks the integrity of the bootloader.
Boardloader key points:
- Embedded and unmodifiable
- Loads the bootloader and checks its integrity
Bootloader
The bootloader installs, updates, and checks the firmware. If an unofficial firmware is detected, a warning is displayed.
Bootloader key points:
- Uploads, updates, and checks firmware integrity
- Is updatable
- Signatures checked by the bootloader
Firmware
Firmware operates the device, executes functions, and maintains security.
Firmware key points:
- Operates the device
- Checked by the bootloader
- Regularly updated
Keep your device updated with the latest firmware to counter security threats.
Trezor Model One
Operating Systems
There are multiple layers of code ensuring the legitimacy and safety of operations executed by your device.
Bootloader
The bootloader installs, updates, and checks the firmware loaded on the device. It verifies the integrity of the firmware and displays a warning if unofficial firmware is detected.
Bootloader key points:
- Uploads, updates, and checks the integrity of the firmware
- Is updatable
- Signatures checked by the bootloader
Firmware
Firmware operates the device, executes functions, and maintains security.
Firmware key points:
- Operates the device
- Checked by the bootloader
- Regularly updated
Keep your device updated with the latest firmware to counter security threats.