About Trezor Bridge
Trezor Bridge is a small, local application that provides a reliable transport layer enabling modern web browsers and web-based wallets to communicate with your Trezor hardware wallet. Bridge exposes USB and HID transports to the browser in a controlled way, so signing remains device-bound while the user experience stays smooth across platforms.
Why Bridge matters
Browsers change rapidly and impose security restrictions on device access. Bridge acts as a consistent local endpoint that handles these variations, avoids the need for kernel-level drivers, and gives web apps a stable way to request device signatures and approvals. It does not send your secrets anywhere — it merely relays messages between host software and the secure element on the device.
Downloads
Always download Bridge only from the official vendor site or verified release repository. Below are the common distribution packages; in production replace these demo actions with properly signed assets and published checksums.
Installation & setup
Follow platform-specific instructions. These steps minimize risk and ensure Bridge runs with appropriate permissions.
Verify (quick)
On macOS/Linux: shasum -a 256 path/to/file or sha256sum. On Windows PowerShell: Get-FileHash -Algorithm SHA256 path\to\file. If a GPG signature is provided, verify with gpg --verify after importing the vendor's public key.
Windows
- Run the signed installer and approve UAC prompts showing the verified publisher.
- Allow the Bridge process in firewall or security prompts if required for local communication.
- Open your browser and the web wallet — when prompted, allow the site to access the device.
macOS
- Mount the .dmg and drag the app to Applications.
- On first run, macOS may request permission to access USB devices; approve the prompt.
- Open the browser and connect your device when asked.
Linux
- Make AppImage executable (
chmod +x) and run, or install distro package. - Add udev rules if necessary so non-root users can access the device. Follow vendor-supplied udev examples.
- Start Bridge and open your browser to pair the device.
Security & privacy notes
Bridge is designed to be minimal and local-only. Still, security depends on the whole environment — the device, the host OS, the browser, and you. Below are practical mitigations to reduce risk.
- Verify installers: Always check SHA256 checksums and verify digital signatures when provided.
- Keep software updated: Apply updates to Bridge, your browser, and device firmware promptly after reading release notes.
- Trusted hosts only: Use Bridge on personal machines you control; avoid public or shared computers.
- Minimize permissions: Revoke site permissions for device access when not in use and avoid unnecessary browser extensions.
- On-device confirmation: Always verify transaction details (address, amount, fee) on your Trezor display before approving.
Troubleshooting
Common issues are typically related to permissions, cable problems, or browser settings. Use the steps below to isolate the cause.
Device not detected
Try a different USB cable and port (avoid hubs). Verify the device powers on and is not in bootloader mode. On Linux, ensure udev rules allow access; on macOS check System Preferences > Security for USB permissions.
Browser blocks access
Clear site permissions for the wallet origin and retry. Some browsers show a small device icon near the address bar for granting access. If the browser uses experimental flags for WebHID/WebUSB, revert to defaults unless absolutely necessary.
Bridge service not running
Restart the Bridge application or service. On Windows check Task Manager/Services; on macOS check Activity Monitor; on Linux check running processes or journal logs.
Checksum mismatch
If the downloaded file's checksum does not match the published checksum, delete the file, re-download only from the official releases page, and verify again. If mismatch persists, contact vendor support.
Developer & advanced notes
For integrators and developers: Bridge exposes a local HTTP/WebSocket endpoint (or transport API) that web apps can use. Ensure your integration verifies origin, uses secure contexts (HTTPS), and performs explicit user consent flows before requesting device interaction. Log minimal data and never log sensitive transaction payloads.