Trezor simply unveiled Protected 7 and set a Nov. 23, 2025 ship date with the corporate is advertising and marketing the gadget as “quantum-ready.”
Nonetheless, the label refers back to the pockets’s capability to confirm future firmware and gadget attestation utilizing post-quantum cryptography as soon as these paths can be found, to not on-chain protections for Bitcoin or Ethereum at the moment.
In line with Trezor’s personal explainer on quantum readiness, post-quantum upgrades for public networks don’t exist but, so Protected 7’s design objective is to simply accept, confirm, and run these updates once they arrive, and to show gadget authenticity throughout that transition.
The transfer extends the gadget chain of belief, that means the boot course of, attestation passport, and replace checks are structured so as to add post-quantum algorithms later with out swapping {hardware}.
A core a part of the pitch is auditability on the silicon boundary.
Protected 7 introduces TROPIC01, a safe chip constructed so exterior researchers can examine the way it handles secrets and techniques such because the PIN and seed, as an alternative of treating the silicon as a sealed black field.
In line with Trezor, Protected 7 pairs TROPIC01 with a second, licensed safe aspect for layered storage and tamper resistance, which goals to diversify failure modes and cut back single-point publicity.
The audit posture issues as a result of a lot of the {hardware} pockets menace floor has shifted from community assaults to person endpoints and signing flows, the place {hardware}, firmware, backups, and restoration procedures create sensible choke factors.
Connectivity is one other change. Protected 7 provides Bluetooth for cellphone use, however the hyperlink runs by way of Trezor Host Protocol, which Trezor describes as an open specification that gives encryption, authentication, and integrity for host-to-device messages.
The corporate states that Bluetooth might be disabled and the gadget can function in USB-only mode for customers who don’t want a wi-fi interface. That provides a transparent working selection for customers who worth cable-only signing or who segregate gadgets by transport coverage.
Protected 7 doesn’t change how public networks validate transactions at the moment.
Bitcoin and Ethereum proceed to depend on ECDSA and Schnorr signatures, and any transfer to post-quantum or hybrid signature schemes would come by way of network-level processes that embody consumer code updates, gentle or exhausting fork mechanics, and broad ecosystem coordination.
In line with Trezor’s documentation, the Protected 7 strategy is to make sure the gadget can belief and confirm firmware, attestation, and software updates that incorporate post-quantum algorithms as soon as the networks and consumer software program help them, in order that customers aren’t gated by {hardware} when migration home windows open.
The timing lands in a 12 months when wallet-targeted crime has taken a bigger share of crypto losses. In line with Chainalysis, about $2.17 billion had been stolen by mid-2025, already outpacing the full-year 2024 whole, with a better portion coming from compromises that contact person wallets and keys reasonably than solely protocol-level exploits.
That surroundings places stress on endpoint hardening, together with gadget authenticity checks and a clear path for safety updates that may be scrutinized by the neighborhood.
On the coverage layer, the world is already shifting right into a post-quantum requirements period.
The U.S. Nationwide Institute of Requirements and Expertise finalized the primary post-quantum requirements in 2024, together with FIPS 203 for CRYSTALS-Kyber key institution and FIPS 204 and 205 for CRYSTALS-Dilithium and SPHINCS+ signatures.
Exterior crypto, mainstream merchandise have begun delivery post-quantum protections to billions of customers, comparable to Apple’s adoption of the PQ3 protocol for iMessage, which illustrates how migration might be staged in manufacturing environments with fallbacks and telemetry, lengthy earlier than each ecosystem participant switches without delay.
That macro backdrop frames why a “quantum-ready” pockets is about readiness greater than quick impression.
The helpful distinction for on a regular basis holders is that Protected 7 prepares the gadget to belief future post-quantum firmware and to show it’s a real Trezor even when attestation strikes to post-quantum algorithms, whereas on-chain transaction codecs and consensus guidelines stay unchanged till networks undertake new cryptography.
In sensible phrases, this appears to be like like a startup chain and passport that may incorporate new signature suites for boot validation and replace authorization, plus a communications layer with authenticated, encrypted periods over Bluetooth or USB.
For consumers deciding whether or not to improve, the calculus splits alongside two traces.
Customers who need {hardware} that may confirm post-quantum firmware and attestations on day one, and who worth an auditable safe chip over closed silicon, could desire Protected 7’s posture now.
Customers who’re happy with a present pockets and plan to revisit as soon as networks announce precise post-quantum or hybrid transaction help can moderately wait, since Protected 7’s headline profit at the moment is improve agility reasonably than quick modifications to how Bitcoin or Ethereum signatures are generated and validated.
Trezor’s documentation is express that network-level post-quantum updates aren’t obtainable but, so expectations must be set accordingly.
A near-term query for safety groups is the way to function Protected 7 inside current insurance policies. The gadget permits USB-only workflows for environments that ban wi-fi interfaces, and it makes use of an open host protocol for authenticated and encrypted periods the place Bluetooth is permitted.
The twin-element storage mannequin and auditable chip floor might be of curiosity to labs and impartial reviewers, since extra inspection factors imply extra alternatives to confirm that key dealing with, fault detection, and reminiscence isolation behave as documented.
Sector steerage continues to push establishments to plan for post-quantum dangers on multi-year timelines. Banking and public-sector our bodies have known as for early migration planning on account of harvest-now, decrypt-later danger, the place attackers file site visitors at the moment so as to decrypt later as soon as succesful {hardware} is offered, which strikes the planning window ahead even when sensible quantum assaults on present public-key schemes stay years out.
For a coverage snapshot, see the Europol-affiliated view that banks ought to put together for quantum laptop danger now. For crypto platforms, a believable path is staged adoption that begins with hybrid verification in chosen flows comparable to withdrawals or custody attestations, adopted by broader consumer help as soon as requirements and libraries stabilize.
In that world, {hardware} that may confirm post-quantum updates and not using a gadget swap reduces operational friction throughout cutover home windows.
Key info that matter for the subsequent few months are easy.
Protected 7’s product web page lists availability on Nov. 23, 2025, making a window for early evaluations and wallet-to-wallet comparisons on auditability, connectivity controls, and replace self-discipline. Chainalysis pegs mid-year theft at $2.17 billion, which retains consideration on device-level protections and restoration hygiene.
NIST’s FIPS set for post-quantum algorithms is finalized, and mainstream distributors have demonstrated at-scale rollouts of post-quantum protocols with staged fallback.
The throughline for crypto customers is that “quantum-ready” means the gadget can belief a post-quantum replace and show gadget identification with post-quantum attestation when that software program is prepared, not that on-chain signatures are completely different at the moment.
ItemDetailAvailabilityNov. 23, 2025 (see the product web page)SiliconTROPIC01 auditable safe chip plus a second licensed safe elementConnectivityBluetooth by way of Trezor Host Protocol, USB-only mode availablePost-quantum scopeDevice firmware and attestation path prepared for post-quantum algorithms, no change to community signaturesContext2.17 billion {dollars} stolen by mid-2025 per Chainalysis, NIST FIPS 203/204/205 accepted in 2024



















