{{Title|title=Trezor Hardware Wallet}}
{{Header}}
{{#seo:
|description=How to use the Trezor Hardware Wallet in {{project_name_long}}
}}

{{stub}}

= Installation =
* {{non_q_project_name_long}}: In {{project_name_workstation_long}}.
* {{q_project_name_long}}: In <code>{{project_name_workstation_template}}</code> Template.

{{CodeSelect|code=
sudo adduser user plugdev
}}

<ref>
Required, otherwise Trezor Suite will show would show error "Trezor Bridge is not running".

Maybe <code>python3-hid</code> is superfluous in some use cases. Package <code>trezor</code> <code>Recommends:</code> it.
</ref>
{{Install Package|package=
trezor python3-hid
}}

== Signing Key Download ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>)

{{gpg key
|url=scurl-download https://trezor.io/security/satoshilabs-2021-signing-key.asc
|source_filename=satoshilabs-2021-signing-key.asc
|fingerprint=EB483B26B078A4AA1B6F425EE21B6950A2ECB65C
|gpg_fingerprint_output=
      Key fingerprint = EB48 3B26 B078 A4AA 1B6F  425E E21B 6950 A2EC B65C
}}

== Download ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>)

Check the latest version number and read the release notes [https://suite.trezor.io/ here].

Download bisq.

{{CodeSelect|code=
scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}

Download OpenPGP signature.

{{CodeSelect|code=
scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
}}

== Digital Software Signature Verification ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>)

Verify OpenPGP signature.

{{CodeSelect|code=
gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
}}

{{GnuPG-Success}}

{{GnuPG-Warning}}

== Make Executable ==
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>)

Make file <code>Trezor-Suite-21.10.2-linux-x86_64.AppImage</code> executable.

{{CodeSelect|code=
chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}

= Usage =
'''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>)

Run the following command to start the Trezor Suite.

{{CodeSelect|code=
./Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}

= Qubes Issues =
Symptom:

<pre>
kernel: vhci_hcd: vhci_device speed not set
kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad
</pre>

* https://github.com/trezor/trezor-suite/issues/4173
* https://github.com/QubesOS/qubes-issues/issues/4173
* https://github.com/QubesOS/qubes-issues/issues/3778
* https://github.com/trezor/trezor-core/issues/167
* https://marc.info/?l=linux-usb&m=156423432111134

The official instructions by Trezor for Qubes OS https://wiki.trezor.io/Qubes_OS lead to a security degradation because of running third party software inside the USBVM.

Ideas:

* '''A)''' Create another <code>sys-usb</code> with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. <u>And/or</u>
* '''B)''' switch off <code>sys-usb</code> altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue https://github.com/QubesOS/qubes-issues/issues/6368

= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]