Secure your crypto assets with the world's most trusted hardware wallet. Get started in minutes with our simple setup guide.
Industry-leading security meets user-friendly design. Protect your digital assets with confidence.
Your private keys are stored offline in a certified secure chip, protected from online threats and hackers.
Seamlessly manage your crypto portfolio on any device with Ledger Live's intuitive interface.
Join over 5 million users worldwide who trust Ledger to secure their digital assets.
Follow these simple steps to set up your Ledger device and start securing your cryptocurrency today.
Start by downloading the official Ledger Live application on your desktop or mobile device. This is your gateway to managing your crypto assets securely.
Unbox your Ledger hardware wallet and connect it to your computer using the provided USB cable. Follow the on-screen instructions to power it on.
Create a secure PIN code and write down your 24-word recovery phrase. This phrase is the master key to your assets - keep it safe and never share it.
Install apps for your favorite cryptocurrencies, receive and send assets, and enjoy complete control over your digital wealth with industry-leading security.
Welcome to Ledger.com/start, your comprehensive resource for setting up and securing your digital assets. Whether you're a cryptocurrency beginner or an experienced trader, proper security starts with understanding how to correctly initialize and use your Ledger hardware wallet. This guide will walk you through every essential step to ensure your crypto journey begins on the right foot.
In the evolving landscape of digital finance, hardware wallets represent the gold standard for cryptocurrency security. Unlike software wallets that store your private keys on internet-connected devices, Ledger hardware wallets keep your keys completely offline in a secure element chip. This certified secure chip, similar to those used in credit cards and passports, ensures that your private keys never leave the device and cannot be extracted, even if your computer is compromised by malware or hackers.
When you first receive your Ledger device, verify that the box is sealed and shows no signs of tampering. This is your first line of defense against supply chain attacks. Inside, you'll find your Ledger device, a USB cable, recovery phrase sheets, and instruction materials. Begin by connecting your device to your computer and visiting Ledger.com/start to download Ledger Live, the official companion application that serves as your interface for managing cryptocurrencies.
During initialization, you'll be prompted to choose between setting up as a new device or restoring from a recovery phrase. For new users, select "Set up as new device" and create a PIN code between 4 and 8 digits. This PIN protects your device from unauthorized physical access. Choose a PIN that's memorable but not easily guessable, and never share it with anyone.
The most critical step in your setup process is properly recording and storing your 24-word recovery phrase. This phrase is generated randomly by your device and represents the master key to all your cryptocurrency holdings. Write each word carefully on the provided recovery sheets in the exact order displayed. Double-check your work, as a single mistake could result in permanent loss of access to your funds. Never take a photograph of your recovery phrase, store it digitally, or enter it into any website or application claiming to need it for "verification."
Once your device is initialized, use Ledger Live to install applications for the cryptocurrencies you want to manage. Each cryptocurrency requires its own app on your Ledger device. Bitcoin, Ethereum, and other major cryptocurrencies have dedicated apps, while many tokens (like ERC-20 tokens) are managed through the Ethereum app. The device's memory can hold multiple apps simultaneously, and you can easily install or uninstall them as needed without affecting your holdings.
Maintaining security doesn't end with initial setup. Always verify receiving addresses on your Ledger device's screen before confirming transactions. Regularly update your Ledger Live software and device firmware through official channels only. Be cautious of phishing attempts—Ledger will never ask for your recovery phrase through email, social media, or phone calls. Consider using a passphrase (25th word) for additional security layers, especially for larger holdings. Finally, test your recovery process with a small amount before committing significant funds, ensuring you can successfully restore your wallet if needed.
Everything you need to know about getting started with Ledger