Unbox & verify
Open your device and verify the tamper-evident packaging. Only use devices purchased from an authorized seller. Follow the included quick-start sheet — the device will display a welcome screen when powered on.
A simple, safe first step to secure your crypto—step-by-step setup and guidance for new hardware wallet users.
This page walks you through the essential steps to set up a hardware wallet, create a secure recovery plan, and begin managing crypto with confidence. Read at your own pace — these steps are intentionally simple and resilient.
Open your device and verify the tamper-evident packaging. Only use devices purchased from an authorized seller. Follow the included quick-start sheet — the device will display a welcome screen when powered on.
Follow the device prompts to create a new wallet. You will set a device PIN and the device will generate a recovery phrase — write this phrase down on paper or a metal backup, never store it digitally.
Keep your recovery phrase in a safe, physical location. Consider splitting it into multiple secure locations or using a certified metal backup for long-term durability against fire, water, and physical damage.
Connect to the official companion app to manage accounts, install coin apps, and receive firmware updates. Always download the app from official sources and check the app’s digital signatures if available.
When receiving funds, always verify the receiving address on your hardware device screen — not just in the app. This guarantees the address cannot be tampered with by malware on your computer or phone.
Hardware wallets isolate your private keys in a secure chip so that signing transactions happens on-device. This removes direct exposure to the internet and software threats, dramatically increasing security compared to hot wallets.
If your device is lost or damaged, you can restore access using your recovery phrase on a compatible device. This is why securing your recovery phrase is the most critical step.
No system is 100% immune, but hardware wallets significantly reduce attack vectors. Follow best practices: keep firmware up-to-date, verify addresses on-device, avoid downloading unofficial apps, and never share your recovery phrase.