{{Header}}
{{Title|title=
Trezor Hardware Wallet
}}
{{#seo:
|description=How to use the Trezor Hardware Wallet in {{project_name_long}}
}}
{{crypto_hardware_wallets_mininav}}
= Introduction =
todo
= Installation =
Platform specific.
* {{non_q_project_name_long}}: No special notice.
* {{q_project_name_long}}: In <code>{{project_name_workstation_template}}</code> Template.
{{CodeSelect|code=
sudo adduser user plugdev
}}
<ref>
Required, otherwise Trezor Suite will show would show error "Trezor Bridge is not running".
Maybe <code>python3-hid</code> is superfluous in some use cases. Package <code>trezor</code> <code>Recommends:</code> it.
</ref>
{{Install Package|package=
trezor python3-hid
}}
== Signing Key Download ==
Platform specific.
* {{non_q_project_name_long}}: No special notice.
* {{q_project_name_long}}: In <code>{{project_name_workstation_vm}}</code> App Qube.
{{gpg key
|url=scurl-download
https://trezor.io/security/satoshilabs-2021-signing-key.asc
|source_filename=satoshilabs-2021-signing-key.asc
|fingerprint=EB483B26B078A4AA1B6F425EE21B6950A2ECB65C
|gpg_fingerprint_output=
Key fingerprint = EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C
}}
== Download ==
Platform specific.
* {{non_q_project_name_long}}: No special notice.
* {{q_project_name_long}}: In <code>{{project_name_workstation_vm}}</code> App Qube.
Check the latest version number and read the release notes [
https://suite.trezor.io/ here].
Download the Trezor Suite AppImage.
{{CodeSelect|code=
scurl-download
https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}
Download OpenPGP signature.
{{CodeSelect|code=
scurl-download
https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
}}
== Digital Software Signature Verification ==
Platform specific.
* {{non_q_project_name_long}}: No special notice.
* {{q_project_name_long}}: In <code>{{project_name_workstation_vm}}</code> App Qube.
Verify OpenPGP signature.
{{CodeSelect|code=
gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
}}
{{GnuPG-Success}}
{{GnuPG-Warning}}
== Make Executable ==
Platform specific.
* {{non_q_project_name_long}}: No special notice.
* {{q_project_name_long}}: In <code>{{project_name_workstation_vm}}</code> App Qube.
Make file <code>Trezor-Suite-21.10.2-linux-x86_64.AppImage</code> executable.
{{CodeSelect|code=
chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}
= Usage =
Platform specific.
* {{non_q_project_name_long}}: No special notice.
* {{q_project_name_long}}: In <code>{{project_name_workstation_vm}}</code> App Qube.
Run the following command to start the Trezor Suite.
{{CodeSelect|code=
/Trezor-Suite-21.10.2-linux-x86_64.AppImage
}}
= Qubes Issues =
Symptom:
<pre>
kernel: vhci_hcd: vhci_device speed not set
kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad
</pre>
*
https://github.com/trezor/trezor-suite/issues/4173
*
https://github.com/QubesOS/qubes-issues/issues/4173
*
https://github.com/QubesOS/qubes-issues/issues/3778
*
https://github.com/trezor/trezor-core/issues/167
*
https://marc.info/?l=linux-usb&m=156423432111134
The official instructions by Trezor for Qubes OS
https://wiki.trezor.io/Qubes_OS lead to a security degradation because of running third party software inside the USBVM.
Ideas:
* '''A)''' Create another <code>sys-usb</code> with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. <u>And/or</u>
* '''B)''' switch off <code>sys-usb</code> altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue
https://github.com/QubesOS/qubes-issues/issues/6368
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]