Tropic Square’s Secure Element Deployed in The Latest Trezor Crypto Hardware Wallet
TROPIC01 becomes the world’s first transparent secure element to power a consumer device, establishing a new benchmark for open-source hardware security.
"We use TROPIC01 in the Trezor Safe 7 wallet to verify authenticity and to encrypt the seed against the PIN. The seed is not stored in any SE; it is encrypted in the main MCU using a key from TROPIC and Optiga. An attacker would need to compromise all three independent layers to reach it."

The integration of TROPIC01 in Trezor Safe 7 marks the beginning of a broader movement toward auditable and adaptable security across industries.
-
Additional Security Layer
-
MAC&Destroy - Patent pending PIN verification scheme
-
Supply chain authenticity verifiability
-
Source of randomness
Additional Security Layer
Authenticated at every step
TROPIC01 adds a powerful secure channel that ensures only the genuine chip and trusted firmware authenticate each other. Every command comes from a trusted source while the mechanism blocks brute-force attacks by irreversibly destroying secrets after too many failed attempts.
Verifiable By Design
Nothing to hide
The real security should be inspectable. Anyone can audit its design, test its defenses, and verify that the protection is real. No black boxes. This open model means vulnerabilities are found and fixed faster, making the wallet more secure over time.
Hardware-Locked Protection
Permanently sealed secrets
TROPIC01 tracks each PIN attempt in hardware using a tamper-resistant counter. A correct PIN restores access, but every failed attempt consumes a token that can’t be reused. When all allowed attempts are used, the secret is permanently sealed. It’s a self-limiting system that makes unauthorized access virtually impossible — even if the wallet falls into the wrong hands.
Simple PIN. Strong Protection.
No need to remember long keys
Users unlock the wallet using their own PIN – no need to remember complex passwords or store recovery phrases elsewhere. Behind that simplicity is a robust, hardware-enforced system that securely protects your seed and resists attacks. Easy for the user. Impossible for attackers.
A New Standard for Secure Hardware
The new Trezor Safe 7 with integrated TROPIC01 becomes the first open secure element used in a globally available consumer product setting a new industry benchmark for secure hardware.
Your keys never leave the chip.
Signing happens inside, protected from physical attacks.
The chip protects master key with MAC&Destroy
TROPIC01 protects keys, but can’t stop user mistakes like typing the seed into a fake website.
TROPIC01 provides randomness
High quality random number generator is used to increase entropy during device initialization.
Only verified firmware can run
Secure boot and cryptographically signed firmware verification ensure only trusted software runs.
Protected from physical attacks
TROPIC01 has built-in defenses against side-channel attacks, glitching, and tampering.
"What we’ve achieved with Trezor is more than a product milestone, it’s a signal for the entire hardware industry."
Years ago, while prototyping with a secure chip, developers at Trezor uncovered critical vulnerabilities. Bound by NDA, they couldn’t disclose details, the vendor dismissed the attack as “out of scope”. Out of scope is attackers' playground.
That experience revealed the inherent risks of closed-source secure chips and sparked the inception of Tropic
Square. A new fabless chip company on a mission to fix what’s broken in hardware security.
"We chose the hard way, because anything less wouldn’t cut it for securing private keys to billions of dollars and for other critical applications where security failure is simply not an option. Instead of locking flaws behind NDAs, we built a secure chip that anyone can attack, inspect and validate. Auditable, open architecture, and free from the black boxes that breed complacency. We don’t just tolerate scrutiny. We invite it. We encourage independent researchers, academics, and engineers to probe our chips, break them if they can, and push us to continuously improve.
Every attempted exploit drives faster patches, smarter defenses, and stronger hardware. Because security isn’t a static certificate. It’s a living process. One that must evolve as fast as the threats themselves."
