Ledger Start

A simple, safe first step to secure your crypto—step-by-step setup and guidance for new hardware wallet users.

Start protecting your digital assets — in minutes

This page walks you through the essential steps to set up a hardware wallet, create a secure recovery plan, and begin managing crypto with confidence. Read at your own pace — these steps are intentionally simple and resilient.

  1. 1

    Unbox & verify

    Open your device and verify the tamper-evident packaging. Only use devices purchased from an authorized seller. Follow the included quick-start sheet — the device will display a welcome screen when powered on.

  2. 2

    Create a new wallet

    Follow the device prompts to create a new wallet. You will set a device PIN and the device will generate a recovery phrase — write this phrase down on paper or a metal backup, never store it digitally.

  3. 3

    Secure your recovery

    Keep your recovery phrase in a safe, physical location. Consider splitting it into multiple secure locations or using a certified metal backup for long-term durability against fire, water, and physical damage.

  4. 4

    Install the companion app

    Connect to the official companion app to manage accounts, install coin apps, and receive firmware updates. Always download the app from official sources and check the app’s digital signatures if available.

  5. 5

    Receive and verify

    When receiving funds, always verify the receiving address on your hardware device screen — not just in the app. This guarantees the address cannot be tampered with by malware on your computer or phone.

Begin setup guide Estimated time: 10–20 min

Quick FAQs

Why use a hardware wallet?

Hardware wallets isolate your private keys in a secure chip so that signing transactions happens on-device. This removes direct exposure to the internet and software threats, dramatically increasing security compared to hot wallets.

What if I lose my device?

If your device is lost or damaged, you can restore access using your recovery phrase on a compatible device. This is why securing your recovery phrase is the most critical step.

Can Ledger devices be hacked?

No system is 100% immune, but hardware wallets significantly reduce attack vectors. Follow best practices: keep firmware up-to-date, verify addresses on-device, avoid downloading unofficial apps, and never share your recovery phrase.