Trezor Bridge is a lightweight software component that enables seamless and secure communication between your Trezor hardware wallet and supported web browsers. It acts as a secure transport layer, ensuring that commands, transaction data, and confirmations pass safely between your device and Trezor Suite or compatible applications.
Learn MoreTrezor Bridge is an essential background application designed to connect your Trezor hardware wallet to your computer’s browser. Unlike browser extensions, Trezor Bridge runs as a local service on your operating system, creating a secure and reliable communication channel.
When you use Trezor Suite Web or supported third-party wallets, the browser needs a secure method to communicate with your physical device. Trezor Bridge provides that secure pathway without exposing private keys or sensitive data to the internet.
Once installed, Trezor Bridge automatically detects when your Trezor device is connected via USB. It initializes a secure handshake process between the device and your browser.
The software establishes encrypted communication between your hardware wallet and the web interface. No private keys leave the device at any point.
When initiating a transaction, the browser sends unsigned transaction data through Trezor Bridge to the device for verification and signing.
The user confirms the transaction directly on the Trezor screen, preventing malware or phishing attacks from modifying transaction details.
Trezor Bridge operates as a local HTTP server running on your computer. When you access Trezor Suite Web, the web interface communicates with the local Bridge instance via localhost. This ensures that device commands never pass directly through remote servers.
The communication protocol uses secure APIs and device-level encryption standards implemented within Trezor firmware. This layered approach ensures that even if your computer is compromised, attackers cannot extract private keys from the hardware wallet.
Trezor Bridge supports Windows, macOS, and Linux operating systems. Installation packages are digitally signed to prevent tampering.