# Trezor.io/Start®

<figure><img src="/files/2sNmO2X0HUiwnYeoWKOr" alt=""><figcaption></figcaption></figure>

The recent Trezor data breach highlights the persistent threat of phishing scams in the cryptocurrency industry. Even though hardware wallets are considered one of the safest ways to store digital assets, the exposure of contact information can lead to sophisticated phishing attacks. Hackers may use the leaked email addresses and usernames to impersonate Trezor and trick users into revealing their recovery seeds or login credentials.

To mitigate these risks, users should be aware of common phishing tactics and exercise caution when handling their cryptocurrency accounts. Trezor advises users to verify any communications claiming to be from the company, avoid clicking on suspicious links, and never share their recovery seeds. By following these guidelines, users can better protect their assets and contribute to a more secure cryptocurrency environment​.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://iostart-entrezorsupport.gitbook.io/us/trezor.io-start-r.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
