Trezor Bridge is the essential communication tool that securely connects your Trezor hardware wallet to your web browser. Experience seamless interaction with Trezor Suite and other web-based crypto applications without compromising on security.
Trezor Bridge is a lightweight, background application designed specifically to facilitate communication between your Trezor hardware wallet and your web browser. Before the advent of Trezor Bridge, browsers relied on plugins which often had security vulnerabilities and compatibility issues. Trezor Bridge solves this by creating a local server that acts as a secure intermediary.
When you connect your Trezor device to your computer via USB, it doesn't automatically talk to websites. This is a security feature. Trezor Bridge listens for signals from authorized web applications—like the official Trezor Suite for Web or third-party wallets like MetaMask—and securely transmits your approval (signed transactions) back to the browser.
It runs quietly in the background, requiring zero user interaction after installation. It is the invisible backbone that ensures your private keys never leave your device while still allowing you to interact with the decentralized web seamlessly. Whether you are managing Bitcoin, Ethereum, or thousands of other supported assets, Trezor Bridge ensures that the connection remains stable, encrypted, and fast.
Works in the background to connect your hardware to the web instantly.
Your private keys never leave the device. Bridge only transports public data.
Built with security and usability in mind, Trezor Bridge offers a robust set of features to ensure your crypto journey is safe.
Establishes an encrypted local connection (127.0.0.1) that prevents phishing attacks and man-in-the-middle exploits. Only authorized requests are processed.
Fully compatible with all Trezor models including Trezor Model One, Trezor Model T, and the new Trezor Safe 3. One bridge for all devices.
Whether you are on Windows, macOS, or Linux, Trezor Bridge provides a consistent experience across all major operating systems.
No data collection, no analytics, and no tracking. Trezor Bridge processes data locally on your machine and never sends personal info to the cloud.
A simple "install and forget" setup. Once installed, it starts automatically with your system and keeps itself ready for when you need it.
Designed to be unobtrusive. It uses minimal system resources and doesn't clutter your taskbar or system tray with unnecessary icons.
Get the official installer for your operating system from the download section below. Run the installer and follow the simple on-screen prompts.
Plug in your Trezor hardware wallet using the USB cable. Ensure the device is powered on and unlocked if necessary.
Navigate to Trezor Suite for Web or any compatible third-party wallet. The application will automatically detect the Bridge.
Bridge handles the handshake. You confirm actions physically on your Trezor device, ensuring your keys remain offline.
Modern web browsers are sandboxed for security, meaning they cannot directly access USB devices connected to your computer without permission.
Trezor Bridge acts as a trusted local server that bridges this gap. It speaks the specific protocol (USB HID/WebUSB) that the hardware understands and translates it into a format the web browser can safely interact with.
Securely connect your device today. Always verify you are downloading from the official source.
Installer (.exe)
Disk Image (.dmg)
Package (.deb / .rpm)
Security is not just a feature; it's the foundation of Trezor Bridge. The software is completely open-source, meaning the code is available for anyone to audit on GitHub. This transparency ensures there are no hidden backdoors or malicious code.
Trezor Bridge operates on a strict local-only basis. It does not communicate with external servers for analytics, error reporting, or data collection. Your transaction details, public keys, and balances are only ever transmitted between your device and the specific wallet application you are actively using.
Furthermore, the communication channel is encrypted, ensuring that malware on your computer cannot intercept sensitive data or spoof commands to your device.