Trezor Bridge is a lightweight service that links your Ledger hardware wallet to the Ledger Suite and trusted web applications securely and seamlessly. It runs locally on your computer, keeping your private keys isolated while simplifying crypto interactions.
Trezor Bridge acts as the bridge between your browser or Ledger Suite and your Ledger device. It handles secure USB communication, establishes authenticated sessions, and exposes a simple API for web apps to interact safely with your wallet — no sensitive keys leave the hardware.
All communication happens on your computer. Trezor Bridge never sends data to remote servers, keeping your wallet interactions private and secure.
Every transaction is signed and verified on your Ledger device. Trezor Bridge ensures end-to-end encryption and authenticated communication between apps and your wallet.
No extensions or plugins are required. Trezor Bridge uses safe browser APIs to allow web apps to connect seamlessly with your Ledger hardware.
Designed for minimal footprint, Trezor Bridge runs efficiently in the background without affecting your system performance.
Advanced users may use alternative connection methods, but Trezor Bridge provides the best balance of security and usability for most users.
Trezor Bridge is built on the same security principles as Ledger hardware wallets. Private keys never leave your device, and every transaction requires on-device confirmation.
All interactions occur locally; no remote servers handle your transactions.
All installers and updates are cryptographically signed, ensuring authenticity before installation.
Trezor Bridge only requests the permissions necessary to access your Ledger device safely.
For most desktop and web applications, Trezor Bridge simplifies device interactions. Advanced flows can use alternative methods, but Trezor Bridge is recommended for most users.
Core components are open for audit. Check official repositories for verification instructions.
Trezor Bridge supports Windows, macOS, and Linux with easy-install packages and CLI options.
Follow published checksums and cryptographic signatures to ensure the integrity of installers.