Trezor Hardware Wallet
Installation[edit]
Platform specific.
- Kicksecure: No special notice.
- Kicksecure for Qubes: In
kicksecure-17
Template.
sudo adduser user plugdev
Install package(s) trezor python3-hid
following these instructions
1 Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: In Template.
2
Update the package lists and upgrade the system
.
sudo apt update && sudo apt full-upgrade
3 Install the trezor python3-hid
package(s).
Using apt
command line
--no-install-recommends
option
is in most cases optional.
sudo apt install --no-install-recommends trezor python3-hid
4 Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: Shut down Template and restart App Qubes based on it as per
Qubes Template Modification
.
5 Done.
The procedure of installing package(s) trezor python3-hid
is complete.
Signing Key Download[edit]
Platform specific.
- Kicksecure: No special notice.
- Kicksecure for Qubes: In
kicksecure
App Qube.
- Digital signatures are a tool enhancing download security. They are commonly used across the internet and nothing special to worry about.
- Optional, not required: Digital signatures are optional and not mandatory for using Kicksecure, but an extra security measure for advanced users. If you've never used them before, it might be overwhelming to look into them at this stage. Just ignore them for now.
- Learn more: Curious? If you are interested in becoming more familiar with advanced computer security concepts, you can learn more about digital signatures here digital software signatures.
Securely download the signing key.
scurl-download https://trezor.io/security/satoshilabs-2021-signing-key.asc
Display the key's fingerprint.
gpg --keyid-format long --import --import-options show-only --with-fingerprint satoshilabs-2021-signing-key.asc
Verify the fingerprint. It should show.
Note: Key fingerprints provided on the Kicksecure website are for convenience only. The Kicksecure project does not have the authorization or the resources to function as a certificate authority, and therefore cannot verify the identity or authenticity of key fingerprints. The ultimate responsibility for verifying the authenticity of the key fingerprint and correctness of the verification instructions rests with the user.
Key fingerprint = EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C
The most important check is confirming the key fingerprint exactly matches the output above. [2]
Add the signing key.
gpg --import satoshilabs-2021-signing-key.asc
Download[edit]
Platform specific.
- Kicksecure: No special notice.
- Kicksecure for Qubes: In
kicksecure
App Qube.
Check the latest version number and read the release notes here.
Download the Trezor Suite AppImage.
scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage
Download OpenPGP signature.
scurl-download https://suite.trezor.io/web/static/desktop/Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
Digital Software Signature Verification[edit]
Platform specific.
- Kicksecure: No special notice.
- Kicksecure for Qubes: In
kicksecure
App Qube.
Verify OpenPGP signature.
gpg --verify Trezor-Suite-21.10.2-linux-x86_64.AppImage.asc
If the file is verified successfully, the output will include Good signature
, which is the most important thing to check.
gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner.
This message does not alter the validity of the signature related to the downloaded key. Rather, this warning refers to the level of trust placed in the Kicksecure signing key and the web of trust. To remove this warning, the Kicksecure signing key must be personally signed with your own key.
Make Executable[edit]
Platform specific.
- Kicksecure: No special notice.
- Kicksecure for Qubes: In
kicksecure
App Qube.
Make file Trezor-Suite-21.10.2-linux-x86_64.AppImage
executable.
chmod +x Trezor-Suite-21.10.2-linux-x86_64.AppImage
Usage[edit]
Platform specific.
- Kicksecure: No special notice.
- Kicksecure for Qubes: In
kicksecure
App Qube.
Run the following command to start the Trezor Suite.
./Trezor-Suite-21.10.2-linux-x86_64.AppImage
Qubes Issues[edit]
Symptom:
kernel: vhci_hcd: vhci_device speed not set kernel: usb usb1-port1: Cannot enable. Maybe the USB cable is bad
- https://github.com/trezor/trezor-suite/issues/4173
- https://github.com/QubesOS/qubes-issues/issues/4173
- https://github.com/QubesOS/qubes-issues/issues/3778
- https://github.com/trezor/trezor-core/issues/167
- https://marc.info/?l=linux-usb&m=156423432111134
The official instructions by Trezor for Qubes OS https://wiki.trezor.io/Qubes_OS lead to a security degradation because of running third party software inside the USBVM.
Ideas:
- A) Create another
sys-usb
with a USB controller exclusively attached to that App Qubes. A HVM App Qubes with PCI pass-trough. And/or - B) switch off
sys-usb
altogether for example, if the system has only one USB controller and switch between using USBVM and not using USBVM. -> security issue https://github.com/QubesOS/qubes-issues/issues/6368
Footnotes[edit]

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!