Ledger
Secure hardware wallet

Get started with your Ledger hardware wallet

A step-by-step onboarding guide to set up your device, secure your recovery phrase, and start managing crypto using Ledger Live — designed for both beginners and experienced users who want strong custody of their digital assets.

FAQ

Why use a hardware wallet?

Private keys stay offline

Your private keys never leave the secure element on the device. That means even if your computer is compromised, attackers can't steal your keys.

Cryptographic signing

All transactions are cryptographically signed inside the device. You confirm operations manually using physical buttons, which adds a powerful layer of protection.

Recoverable and portable

A recovery phrase allows you to restore your wallet on a new device if yours is lost or damaged — but only if you keep that phrase safe.

Step-by-step setup

  1. 1

    Unbox and inspect your device

    Only use the device and accessories included in the original package. If the packaging shows signs of tampering, contact official support. Authentic devices are shipped sealed to help you detect tampering.

  2. 2

    Download Ledger Live

    On your computer or phone, download the official companion app (Ledger Live). Ledger Live is the interface used to install apps on your device, create accounts, and manage assets. Only download the app from official sources and verify the download page address carefully.

  3. 3

    Initialize your device

    Follow the on-device prompts to set a PIN. Choose a PIN you can remember but that is not obvious. The device will then display a recovery phrase (often 24 words) — this is the only backup of your private keys. Write it down exactly, in order, on paper or another offline medium. Do not store the phrase digitally, photograph it, or share it with anyone.

  4. 4

    Install apps and add accounts

    Using Ledger Live's Manager, install the apps (Bitcoin, Ethereum, etc.) you wish to manage. Then add accounts for each asset in Ledger Live. Installing an app does not expose private keys; it simply tells the device which blockchains to support.

  5. 5

    Receive a small test transaction

    Before moving significant amounts, receive a small test amount to confirm the address and flow. Always confirm the receiving address displayed in Ledger Live with the address shown on your device screen — they must match exactly.

  6. 6

    Use with caution

    Only sign transactions that you initiated and recognize. When connecting to dApps or swap services, confirm the details on the device screen. If anything looks suspicious, cancel and investigate.

Security best practices — what you must know

Hardware wallets radically reduce risk, but they are not a substitute for good operational security. The most common loss scenarios involve social engineering, phishing, and poor handling of the recovery phrase. This section gives clear, practical guidance to protect your assets over the long term.

Never share your recovery phrase. The recovery phrase is the master key to your funds. Anyone who has it can restore your wallet on another device and steal your funds. Ledger support, legitimate exchanges, and law enforcement will never ask you to disclose it.

Write it down offline. Use a durable method — high quality paper stored in a safe, or consider metal seed backups for long-term protection against fire, moisture, and aging. Keep at least one secure copy in a different physical location (e.g., a home safe and a safety deposit box), but be mindful of the trade-offs between redundancy and exposure.

Guard against phishing. Attackers create convincing fake websites, emails, or apps that imitate official services and trick users into entering their recovery phrases. Always type the correct address, use bookmarks for important sites, and verify TLS/HTTPS. Never paste your recovery phrase into a website or app.

Tip: When in doubt, disconnect your device and check official documentation or support channels. Confirm that you are on the official application or page before proceeding with any sensitive action.

Operational measures

Use a unique PIN and change it if you suspect it’s been exposed. Avoid using the device on shared or untrusted computers when possible. If you must use a public computer, treat it as compromised: do not enter sensitive information or sign transactions you don't fully control.

Handling large holdings

If you manage substantial assets, consider splitting them across multiple devices or using a multi-signature arrangement where several hardware devices or signers are required to approve large transactions. Multi-sig increases complexity but can significantly reduce single-point failure risks.

Finally, keep software up to date. Firmware updates and Ledger Live updates include security and compatibility improvements. Always follow official instructions when updating firmware; do not install unofficial firmware.

Troubleshooting & common questions

My device won't turn on

Try another USB port or cable. Ensure the cable is a data cable (not power-only). If the device still doesn’t power up, consult official support for warranty/repair options.

I lost my PIN

If you forget your PIN but still have your recovery phrase, you can reset the device and restore from your recovery phrase to set a new PIN. If you lost both the device and the recovery phrase, funds are unrecoverable.

How do I know an address is correct?

Always verify receiving addresses on your device's screen. Ledger devices show the address and require manual confirmation; trust that on-device confirmation — not the computer screen — as the authoritative address.

FAQ

Do I need Ledger Live to use my device?

Ledger Live is the official companion app that simplifies management, but your device works with multiple wallets and third-party services. Ledger Live streamlines firmware updates, app installation, and account management.

Can I restore my wallet on another compatible device?

Yes — any compatible device that supports the same recovery standard (typically BIP39/BIP44/BIP32 depending on configuration) can restore your accounts from the recovery phrase. That’s why keeping the phrase secure is critical.

Is a hardware wallet immune to all attacks?

No. It greatly reduces many risks but does not eliminate operational mistakes or social engineering. Attackers can still trick users into revealing recovery phrases or authorizing malicious transactions if users are not careful.

Resources & next steps

When you finish setup:

  • Install only the apps you need for the assets you hold.
  • Create small test transactions before moving large amounts.
  • Explore advanced features: staking, NFTs, and swaps via vetted services.

If you need guided help, reach out to official support channels. Avoid community-sourced instructions for critical steps like recovery phrase handling — rely on official documentation first.

Open Ledger Live