Ledger | Start Hub

The Official Ledger Getting Started Hub

Your **Ledger hardware wallet** is the ultimate key to owning your **digital assets**. This guide will walk you through the essential steps—from unboxing to safe storage—to ensure maximum **crypto security** from day one. Welcome to sovereignty.

Start the Setup Process
Visualization of a Ledger device connected to the Ledger Live application

Phase I: Unboxing, Verification, and Preparation

The first moments with your **Ledger hardware wallet** are the most critical for establishing **crypto security**. Your device is your personal vault for **digital assets**, and its authenticity must be verified immediately. Upon receiving your Ledger, whether it’s a Nano S Plus or a Nano X, thoroughly examine the packaging. Look for any signs of tampering, such as damaged seals, torn shrink wrap, or evidence that the device has been previously handled. A genuine Ledger will always ship with its protective seals intact. This initial **authenticity check** is the first line of defense against supply chain attacks and counterfeit products. If anything looks suspicious, stop the process and contact Ledger support immediately. The secure storage of your crypto begins with this physical verification step.

Once satisfied with the physical integrity, you must download the only official software required: **Ledger Live**. This proprietary application is the mandatory interface between your computer and your **Ledger hardware wallet**. You should **only** download **Ledger Live** from the official ledger.com/start page or the links provided directly within the official Ledger website. Never trust third-party links or unofficial app stores, as these are common vectors for malware designed to steal your **digital assets**. Installing and running **Ledger Live** is essential, as it will manage the firmware installation, initial setup, and day-to-day transactions with the highest degree of **crypto security** protocols.

Phase II: Initializing Your Device with Ledger Live

After installing the **Ledger Live** application, connect your device to your computer via the provided USB cable. The application will immediately begin the process of initializing your **Ledger hardware wallet**. The first step is installing the certified **Ledger firmware**. This process guarantees that the operating system running on your device is the genuine, latest version cryptographically signed by Ledger. A crucial security feature of all Ledger products is that they do not contain pre-installed firmware out of the box, forcing the user to install a verified version, thereby preventing factory-level compromises.

Setting the PIN Code

The next and arguably most critical step in the **Ledger setup** is setting your personal **PIN code**. This code is required every time you connect your **hardware wallet** to unlock it. It protects your **digital assets** from physical theft—if your Ledger device falls into the wrong hands, the PIN prevents unauthorized access to the private keys stored inside. You must choose a strong PIN consisting of 4 to 8 digits. Critically, you enter this PIN *directly on the Ledger device*, not on your computer. This action isolates the PIN entry from any potential keyloggers or screen-scraping malware that might be infecting your computer, providing a vital layer of **crypto security**. Choose a PIN that is easy for you to remember but impossible for others to guess, avoiding common sequences or birthdates. The integrity of your daily security depends entirely on this PIN.

Phase III: The Unbreakable Backup — Protecting Your Recovery Phrase

The **Recovery Phrase**—a sequential list of 24 words—is the master backup for all your **digital assets**. It is the single piece of information capable of restoring your private keys and accessing your funds on a new device, even if your original **Ledger hardware wallet** is completely destroyed. When **Ledger Live** prompts you to write down this 24-word sequence, you must treat this action with the utmost care. Use the official Recovery Sheets provided in the box and a pen. Write down each word *precisely* in the order they appear on the Ledger screen. You must never, under any circumstances, take a picture of your **Recovery Phrase**, save it on a computer, email it, or store it in any digital format (cloud, phone, note app). Digital storage fundamentally undermines the purpose of using a **hardware wallet**.

The concept of **seed phrase security** dictates that this physical paper backup must be stored in a highly secure, private location. Think fireproof safes, secure bank vaults, or other private storage solutions. It is recommended to store your **Recovery Phrase** physically separate from your Ledger device to mitigate risks like fire or localized theft. **Ledger Live** will not proceed until you have confirmed and verified your written **Recovery Phrase**, often requiring you to re-enter a few words in order. This crucial verification step ensures you have correctly recorded the phrase, which is the ultimate safeguard for your crypto investment. Remember: loss of the **Recovery Phrase** means permanent loss of access to your **digital assets**; compromise of the **Recovery Phrase** means loss of all funds. This is the cornerstone of true self-custody and **crypto security**.

Phase IV: Funding, Management, and Ongoing Security

Once your **Ledger setup** is complete and your **Recovery Phrase** is safely stowed, you can proceed to fund your wallet. Using **Ledger Live**, select the desired cryptocurrency account (Bitcoin, Ethereum, etc.) and click "Receive." **Crucially, you must always verify the receiving address on the screen of your Ledger device.** The Ledger device’s secure screen is your trusted source of truth, as its display cannot be manipulated by computer malware. If the address on the computer screen does not exactly match the address shown on the **Ledger hardware wallet** screen, immediately stop the transaction and investigate for malware. This simple act of verification protects your **digital assets** against advanced malicious attacks.

For ongoing **crypto security**, always keep your **Ledger Live** application and device firmware updated. Ledger frequently releases updates to add new features, support new **digital assets**, and address any security enhancements. Always initiate these updates directly through the **Ledger Live** application. Never enter your **Recovery Phrase** into your computer or provide it to anyone, including Ledger support or any purported cryptocurrency exchange or service. Ledger will *never* ask for your 24 words. By diligently adhering to these safety practices, your **Ledger hardware wallet** serves its purpose perfectly, making you the sole, sovereign guardian of your wealth.

Finish Your Setup and Secure Your Financial Future

With your **Ledger hardware wallet** initialized, you are now ready to manage your **digital assets** safely. Download **Ledger Live** to begin your secure journey.

Get Ledger Live

Visit ledger.com/start for official downloads and support resources.