Ledger — Getting Started
This page explains essential steps to set up and use a Ledger hardware wallet. It focuses on clear, practical guidance for new users: unboxing, initial setup, securing recovery information, and best practices for everyday use.
Hardware wallets isolate your cryptocurrency private keys from internet-connected devices. Instead of storing secrets on a phone or computer, you keep them on a small dedicated device. That separation reduces the risk of malware, phishing, or accidental exposure on connected systems. A hardware wallet is not a magic solution — it’s one strong layer in a security-first approach.
Choose a clean, well-lit workspace. Keep the included packaging and documentation until you finish setup. Ensure your computer or mobile device has the official Ledger app installed from a trusted source. Prepare a pen and the recovery sheet provided in the box to record your recovery phrase by hand — never store it digitally.
Open the box and inspect the hardware wallet. Confirm there are no visible signs of tampering with the seal or device casing. Ledger devices ship in sealed packaging; if anything looks altered, pause and contact support via official channels.
Power the device and follow the on-screen instructions to set a PIN code. Choose a PIN that is easy for you to remember but difficult for others to guess. The device will ask you to confirm the PIN twice. This PIN protects access to the device if it is lost or stolen.
During setup the device will generate a recovery phrase comprised of 24 words. Write those words in order on the physical recovery sheet provided. Keep that sheet in a secure location and consider splitting it across multiple secure locations if you prefer redundancy. Do not photograph, copy, email, or type the recovery phrase into any online service.
Install the official Ledger companion application on your computer or mobile device. The app allows you to manage app installations and view account balances, but it never exposes your private keys. When prompted, connect your device and follow the in-app prompts to pair it safely.
Use the companion application to add the specific currencies you plan to store. Each cryptocurrency requires a small management app installed to the device. Install only what you need, and keep firmware and companion apps updated to the latest stable versions when convenient.
Once your device is set up and accounts are created, adopt a few key habits that reduce risk:
If the device is lost, stolen, or damaged, your funds can still be recovered using the recovery phrase on a compatible hardware wallet. Keep recovery information offline and unreachable by attackers. If you suspect your recovery phrase has been exposed, transfer funds out of the associated accounts to a new wallet whose recovery phrase you generate securely.
For users who want additional protections, consider using multi-signature setups or combining a hardware wallet with other security tools. Multi-signature arrangements split the authority to move funds across multiple keys and can greatly reduce the risk of a single point of failure. If you plan to manage large sums, consult a security professional or use reputable custodial solutions for portions of your holdings.
This guide is practical and introductory. Security practices evolve; periodically review your setup and stay informed about firmware updates and community best practices. Treat the recovery phrase as the ultimate backup—its security determines the safety of your funds.