{{Title|title=Trezor Hardware Wallet}} {{Header}} {{#seo: |description=How to use the Trezor Hardware Wallet in {{project_name_long}} }} {{stub}} = Installation = * {{non_q_project_name_long}}: In {{project_name_workstation_long}}. * {{q_project_name_long}}: In <code>{{project_name_workstation_template}}</code> Template. {{CodeSelect|code= sudo adduser user plugdev }} <ref> Required, otherwise Trezor Suite will show would show error "Trezor Bridge is not running". Maybe <code>python3-hid</code> is superfluous in some use cases. Package <code>trezor</code> <code>Recommends:</code> it. </ref> {{Install Package|package= trezor python3-hid }} == Signing Key Download == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>) {{gpg key |url=scurl-download https://trezor.io/security/satoshilabs-2021-signing-key.asc |source_filename=satoshilabs-2021-signing-key.asc |fingerprint=EB483B26B078A4AA1B6F425EE21B6950A2ECB65C |gpg_fingerprint_output= Key fingerprint = EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C }} == Download == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>) Check the latest version number and read the release notes [https://suite.trezor.io/ here]. Download bisq. {{CodeSelect|code= scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage }} Download OpenPGP signature. {{CodeSelect|code= scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc }} == Digital Software Signature Verification == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>) Verify OpenPGP signature. {{CodeSelect|code= gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc }} {{GnuPG-Success}} {{GnuPG-Warning}} == Make Executable == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>) Make file <code>Trezor-Suite-21.10.2-linux-x86_64.AppImage</code> executable. {{CodeSelect|code= chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage }} = Usage = '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: <code>{{project_name_workstation_vm}}</code>) Run the following command to start the Trezor Suite. {{CodeSelect|code= ./Trezor-Suite-21.10.2-linux-x86_64.AppImage }} = Qubes Issues = Symptom: <pre> kernel: vhci_hcd: vhci_device speed not set kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad </pre> * https://github.com/trezor/trezor-suite/issues/4173 * https://github.com/QubesOS/qubes-issues/issues/4173 * https://github.com/QubesOS/qubes-issues/issues/3778 * https://github.com/trezor/trezor-core/issues/167 * https://marc.info/?l=linux-usb&m=156423432111134 The official instructions by Trezor for Qubes OS https://wiki.trezor.io/Qubes_OS lead to a security degradation because of running third party software inside the USBVM. Ideas: * '''A)''' Create another <code>sys-usb</code> with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. <u>And/or</u> * '''B)''' switch off <code>sys-usb</code> altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue https://github.com/QubesOS/qubes-issues/issues/6368 = Footnotes = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]