Security model
Offline keys. On‑device approval. Zero trust in the browser.
Bridge does not store wallets, seed phrases, or secrets. It simply orchestrates a conversation: the browser asks for something, Bridge relays that to your Trezor, and you confirm on the device. Transaction signing happens inside the secure hardware—never in the operating system, never in a web tab. Even if a site is malicious, it cannot extract your private keys because those keys never touch the computer.
Because you approve every action physically, Bridge helps defeat common phishing tricks. A spoofed website cannot silently authorize a transaction; your device will still display the recipient and amount, and you can reject it. This human‑in‑the‑loop design is what makes hardware wallets so powerful.
To stay safe, keep your device firmware and Bridge up to date, verify download sources, and never type your recovery seed on a computer. If a site asks for your seed phrase, it is not legitimate.