Ledger start hero
Get started with your Ledger

Set up your Ledger hardware wallet — securely and simply

This quick start guide walks you through everything you need to safely set up your Ledger device, create a secure recovery phrase, and connect to the Ledger Live app. Whether you’re a brand-new hardware wallet user or moving funds from another wallet, the process below prioritizes security without adding unnecessary complexity.

Why use a hardware wallet?

Hardware wallets keep your private keys offline — away from malware, phishing websites, and compromised computers. Your Ledger device stores the keys inside a secure chip so signing transactions happens on-device. That means your assets remain protected even if your computer is infected.

Before you begin

Unbox your Ledger and make sure the seal is intact. Never buy a pre-configured device from unauthorized channels. Have a pen and the included recovery card ready — you will write down your recovery phrase and store it securely offline.

Important: Your recovery phrase is the only backup of your crypto. Never share it, never store it digitally, and never enter it into websites or apps except on the device itself.

Step-by-step setup

1
Power on & choose a PIN

Follow the device screen to select a PIN. Choose a PIN you can remember — the PIN protects access to the device if it is lost or stolen.

2
Write down your recovery phrase

Record the 24-word recovery phrase on the provided card. Confirm the words on your device — this ensures the phrase was recorded correctly.

3
Install Ledger Live

Download Ledger Live on your computer or mobile device and follow the in-app flow to add your accounts. Always download the app from the official Ledger website.

4
Manage and receive assets

Add the crypto accounts you want to manage, generate receive addresses from the app, and verify the address on your device before receiving funds.

Understanding recovery and device security

Your recovery phrase is the root of your wallet — it is a human-readable representation of the private key that controls access to your accounts. When you set up a Ledger device, the device generates this recovery phrase inside its secure environment and displays the words only on the screen. This design ensures the words never traverse an internet-connected device. Because the recovery phrase alone is enough to restore your funds, it must be treated as the highest-value item in your security strategy.

Many users make the mistake of storing their recovery phrase digitally for convenience. Doing so dramatically increases the risk of theft: screenshots, cloud backups, and notes can be exfiltrated by malware or phishing attacks. The safest approach is to write the words on dedicated recovery cards or engrave them on a metal plate built for long-term storage. Keep at least one copy in a secure physical location — a safe, bank deposit box, or other trusted storage — and consider geographic redundancy for large holdings.

Another key principle is to never enter your recovery phrase into a computer, phone, or website. Legitimate applications never ask for your full recovery phrase. If anyone or any website requests your phrase, treat it as a direct attempt to steal your assets: refuse and report.

Ledger devices are engineered to protect private keys. Signing operations happen within the device itself, and the device shows transaction details (addresses, amounts, fees) on-screen for you to verify. By matching the address on the app with the one shown on the device, you ensure the transaction has not been tampered with by malware.

For advanced users, additional layers of protection are available: passphrase support (a 25th secret word you can add to your recovery) creates additional accounts and segregates funds, and multi-signature setups distribute control across multiple devices or signers. Both approaches reduce risk but increase complexity — evaluate based on your threat model and holdings.

Getting comfortable with these concepts will make your Ledger experience both safe and empowering. The device is a tool: simple to use when you follow the security basics described here, and powerful enough to grow with your needs as you become more experienced.