{{Title|title=Trezor Hardware Wallet}}
{{Header}}
{{#seo:
|description=How to use the Trezor Hardware Wallet in {{project_name_long}}
}}
{{stub}}
= Installation =
* {{non_q_project_name_long}}: In {{project_name_workstation_long}}.
* {{q_project_name_long}}: In {{project_name_workstation_template}}
Template.
{{CodeSelect|code=
sudo adduser user plugdev
}}
Required, otherwise Trezor Suite will show would show error "Trezor Bridge is not running".
Maybe python3-hid
is superfluous in some use cases. Package trezor
Recommends:
it.
{{Install Package|package=
trezor python3-hid
}}
== Signing Key Download ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}
)
{{gpg key
|url=scurl-download https://trezor.io/security/satoshilabs-2021-signing-key.asc
|source_filename=satoshilabs-2021-signing-key.asc
|fingerprint=EB483B26B078A4AA1B6F425EE21B6950A2ECB65C
|gpg_fingerprint_output=
Key fingerprint = EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C
}}
== Download ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}
)
Check the latest version number and read the release notes [https://suite.trezor.io/ here].
Download bisq.
{{CodeSelect|code=
scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}
Download OpenPGP signature.
{{CodeSelect|code=
scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
}}
== Digital Software Signature Verification ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}
)
Verify OpenPGP signature.
{{CodeSelect|code=
gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
}}
{{GnuPG-Success}}
{{GnuPG-Warning}}
== Make Executable ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}
)
Make file Trezor-Suite-21.10.2-linux-x86_64.AppImage
executable.
{{CodeSelect|code=
chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}
= Usage =
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}
)
Run the following command to start the Trezor Suite.
{{CodeSelect|code=
./Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}
= Qubes Issues =
Symptom:
kernel: vhci_hcd: vhci_device speed not set kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad* https://github.com/trezor/trezor-suite/issues/4173 * https://github.com/QubesOS/qubes-issues/issues/4173 * https://github.com/QubesOS/qubes-issues/issues/3778 * https://github.com/trezor/trezor-core/issues/167 * https://marc.info/?l=linux-usb&m=156423432111134 The official instructions by Trezor for Qubes OS https://wiki.trezor.io/Qubes_OS lead to a security degradation because of running third party software inside the USBVM. Ideas: * '''A)''' Create another
sys-usb
with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. And/or
* '''B)''' switch off sys-usb
altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue https://github.com/QubesOS/qubes-issues/issues/6368
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]