Encrypted Transport
Local IPC uses encrypted channels to ensure messages cannot be intercepted or tampered with by other local processes.
Bridge the gap between your Trezor hardware wallet and desktop/web apps with an encrypted, trusted, background connector — keeping keys offline while enabling powerful workflows.
Trezor Bridge provides authenticated local communication, device discovery, and secure relaying for transaction signing — without exposing private keys to networked software.
Trezor Bridge is a lightweight local service that acts as a secure intermediary between Trezor hardware devices and client applications (Trezor Suite or compatible web wallets). It establishes an authenticated, encrypted channel and limits communications to trusted origins, ensuring untrusted code cannot reach your device.
The Bridge replaces browser extensions by providing a cross-platform, centralized communication layer — simplifying integrations while improving the security model.
Local IPC uses encrypted channels to ensure messages cannot be intercepted or tampered with by other local processes.
Bridge validates and restricts connections to explicitly allowed clients, preventing rogue pages or apps from issuing commands.
Available for Windows, macOS, and Linux — the same trusted transport across user systems and browsers.
All signing happens on the hardware device. The Bridge only relays signed results — your private keys never leave the device.
Designed to make integrations straightforward: standardized JSON APIs, PSBT helpers, and clear developer docs for building secure wallet flows.
Runs with minimal resources in the background; auto-updates and diagnostic logs are available for troubleshooting.
Download the installer from the official site, run it with system privileges (required to create a secure local endpoint), and verify signatures if available. During first run, grant the requested permissions and confirm the Bridge service is running.
Open Trezor Suite or a supported web wallet; the app will detect the Bridge and request permission to access your Trezor device. Confirm requests both in the client and on your device screen.
Construct transactions in the client. The Bridge sends them to the device for signing. Always verify addresses and amounts on-device before approving — the Bridge cannot bypass on-device checks.
Keep Bridge and Trezor Suite up to date. Bridge may add new features and security checks in updates; apply them promptly to remain protected from attack vectors fixed in recent releases.
Yes—Bridge is designed to run as a minimal, signed system service. It enforces origin checks and encrypted transport. Only install Bridge from the official Trezor website and verify signatures when provided.
No. Bridge never has access to private keys. All signing occurs on the Trezor hardware device. Bridge merely relays data between client apps and the device.
Browser extensions are tied to a single browser and can be limited by browser sandboxing. Bridge offers a single cross-platfor