Official — Trezor

Trezor Bridge — a safe, local bridge between your browser and your Trezor device

Install Trezor Bridge to enable secure, direct communication between supported apps and your hardware wallet. Bridge keeps private keys on-device and only transports signed messages on your machine.

Trezor device

Install & Connect — quick, quiet, local

Download the installer for Windows, macOS, or Linux. Once Bridge is installed, your browser and supported desktop apps can detect your Trezor and request secure operations — all confirmed on-device.

USB
Reliable USB communication
Bridge provides a stable, local connection to reliably detect and communicate with your Trezor device across browsers.
+

Bridge uses a safe local endpoint: applications request access through your browser, and you always confirm actions on the Trezor screen. No private keys leave the device.

Safe
Hardware-first security
Transactions are signed on-device. Bridge only transports signed responses.
+

Even if an application is compromised, it still cannot perform an operation without you approving it on your Trezor — guaranteeing user intent and security.

Light
Lightweight background service
Bridge runs quietly, auto-starts with your system, and uses minimal resources.
+

No heavy dependencies — Bridge is small, regularly updated, and designed to cause minimal impact on system performance while keeping your wallet available.

Device confirmation

Every sensitive action — sending funds, revealing a public key — requires on-device confirmation so attackers cannot authorize operations remotely.

Local-first architecture

Bridge runs only on your computer and doesn't forward sensitive device operations to third-party servers.

Cross-platform support

Official installers for Windows, macOS, and popular Linux distributions make Bridge easy to install and maintain.

Developer integration

APIs that rely on a stable local endpoint let wallet apps provide consistent device discovery without compromising user safety.

My browser doesn't detect my Trezor — what should I do?
+
Is Bridge safe? Does it send my data to the cloud?
+
How do I update Bridge?
+

About Trezor Bridge

Trezor Bridge is a small, carefully designed utility that creates a secure pathway between your Trezor hardware wallet and desktop applications or supported web pages. Rather than exposing private keys or relying on browser-specific USB behaviors, Bridge provides a consistent local endpoint that applications can use to detect your device and request operations. The core idea is simple: keep sensitive cryptographic operations on the Trezor device, and use Bridge only as a secure messenger on your own computer.

This local-first approach solves real-world compatibility problems. Browsers implement device access differently and often change behavior between releases. Bridge provides a stable layer that abstracts those differences, ensuring that tools like the official Trezor web app, desktop wallet integrations, and developer tools can interoperate with Trezor devices without sacrificing security.

Security remains the highest priority. Trezor Bridge never learns your private keys, nor does it act on your behalf. When an application requests a transaction to be signed, the request travels to the Bridge service, then to the device. The Trezor hardware displays the operation details on its secure screen; only after you approve the operation will the device produce a signed response and Bridge returns that signed data to the application. This division of responsibility significantly reduces attack surfaces and ensures that even a compromised application cannot unilaterally move funds.

Bridge is intentionally lightweight and unobtrusive. It runs as a background process, boots with your machine if you choose, and consumes minimal resources. It is updated regularly to remain compatible with browser changes and operating system patches. Cross-platform installers are available for major desktop operating systems, and maintainers keep the update path simple to encourage users to stay current — an important part of a strong security posture.

For developers, Bridge provides a reliable integration point. Wallets, exchange tools, and browser-based dapps can use a local Bridge endpoint to enumerate connected devices and request operations without relying on experimental browser APIs or doing platform-specific hacks. This simplifies development while ensuring apps continue to respect the hardware-based security model that Trezor devices provide.

From a privacy perspective, Bridge operates entirely on the user's machine and does not broadcast device usage to external services. When an application requests access, you will confirm permission; you can revoke access by closing the app or by disconnecting the device. These safeguards reinforce the principle that the user is always in control of their crypto operations.

In practical terms, installing Trezor Bridge is often the key step for anyone using a Trezor device on a desktop machine. It removes many of the common friction points that prevent discovery or cause intermittent connectivity issues. After installing Bridge, users typically experience a smoother connection workflow: browsers detect the service, apps request a connection, and the user confirms actions directly on the device. For many users, this simply “just works” — and when it doesn’t, the official documentation provides clear troubleshooting steps to restore operations quickly.

Ultimately, Trezor Bridge strikes an important balance between usability and security. It enables the modern convenience of web and desktop integrations while preserving the strongest guarantees offered by hardware wallets: private keys that never leave the device and user-confirmed transactions. If you use a Trezor device on a computer, installing Bridge is a practical and secure choice to make your crypto management more dependable.