{{Title|title=Trezor Hardware Wallet}} {{Header}} {{#seo: |description=How to use the Trezor Hardware Wallet in {{project_name_long}} }} {{stub}} = Installation = * {{non_q_project_name_long}}: In {{project_name_workstation_long}}. * {{q_project_name_long}}: In {{project_name_workstation_template}} Template. {{CodeSelect|code= sudo adduser user plugdev }} Required, otherwise Trezor Suite will show would show error "Trezor Bridge is not running". Maybe python3-hid is superfluous in some use cases. Package trezor Recommends: it. {{Install Package|package= trezor python3-hid }} == Signing Key Download == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}) {{gpg key |url=scurl-download https://trezor.io/security/satoshilabs-2021-signing-key.asc |source_filename=satoshilabs-2021-signing-key.asc |fingerprint=EB483B26B078A4AA1B6F425EE21B6950A2ECB65C |gpg_fingerprint_output= Key fingerprint = EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C }} == Download == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}) Check the latest version number and read the release notes [https://suite.trezor.io/ here]. Download bisq. {{CodeSelect|code= scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage }} Download OpenPGP signature. {{CodeSelect|code= scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc }} == Digital Software Signature Verification == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}) Verify OpenPGP signature. {{CodeSelect|code= gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc }} {{GnuPG-Success}} {{GnuPG-Warning}} == Make Executable == '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}) Make file Trezor-Suite-21.10.2-linux-x86_64.AppImage executable. {{CodeSelect|code= chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage }} = Usage = '''In {{project_name_workstation_short}}.''' ({{q_project_name_short}}: {{project_name_workstation_vm}}) Run the following command to start the Trezor Suite. {{CodeSelect|code= ./Trezor-Suite-21.10.2-linux-x86_64.AppImage }} = Qubes Issues = Symptom:
kernel: vhci_hcd: vhci_device speed not set
kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad
* https://github.com/trezor/trezor-suite/issues/4173 * https://github.com/QubesOS/qubes-issues/issues/4173 * https://github.com/QubesOS/qubes-issues/issues/3778 * https://github.com/trezor/trezor-core/issues/167 * https://marc.info/?l=linux-usb&m=156423432111134 The official instructions by Trezor for Qubes OS https://wiki.trezor.io/Qubes_OS lead to a security degradation because of running third party software inside the USBVM. Ideas: * '''A)''' Create another sys-usb with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. And/or * '''B)''' switch off sys-usb altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue https://github.com/QubesOS/qubes-issues/issues/6368 = Footnotes = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]