Ledger®

Welcome to the Secure Digital World of Ledger

Congratulations on purchasing a Ledger hardware wallet, the cornerstone of self-custody. This official guide at Ledger.com/start will walk you through the simple, step-by-step process of securely setting up your device using the Ledger Live application.

Begin Setup Now

The Definitive Ledger Setup Guide

Follow these precise instructions to ensure a secure and successful setup of your Ledger device. Each step is vital for protecting your digital assets.

Step 1: Check the Box and Its Contents

The very first step is to inspect your Ledger device's physical packaging. Ledger products are shipped in tamper-evident packaging. Look for any signs of tampering, such as a broken seal, evidence of the box being opened, or mismatched serial numbers. The contents should include:

  • The Ledger device itself.
  • A USB-C to USB-A cable (or micro-USB, depending on the model).
  • Three blank Recovery Sheet cards.
  • A keyring and lanyard.
  • Instruction flyers.

If anything is missing, or if you suspect any foul play with the packaging, do not proceed with the setup. Contact Ledger Support immediately. This step is a critical defense against supply chain attacks, where a malicious party might try to compromise the device before it gets to you.

Step 2: Download and Install Ledger Live

Ledger Live is the official application for managing your Ledger hardware wallet. It is your secure gateway to installing cryptocurrency applications on your device, checking your balance, sending and receiving assets, and staking your coins. To ensure your security, **only download Ledger Live from the official Ledger website: Ledger.com/start**. Phishing websites often mimic the official site to trick users into downloading compromised software. By starting here, you eliminate that risk.

  • Select the correct version for your computer's operating system (Windows, macOS, or Linux).
  • Download and run the installer.
  • Once installed, open the Ledger Live application. The interface will guide you through the remaining steps.

Important: Never install a version of Ledger Live from an email, a forum link, or any source other than the official Ledger website. This is a non-negotiable security rule.

Step 3: Connect and Verify Your Ledger

Using the official cable, connect your Ledger device to your computer. The device screen will light up and display a welcome message. Ledger Live will detect your device and perform an initial integrity check. This check verifies that your Ledger is a genuine device and has not been tampered with at the hardware level. This is a unique security feature that ensures the integrity of your device’s secure element.

Step 4: Create a New Wallet

Inside Ledger Live, you will be given the option to "Set up as a new device" or "Restore from a recovery phrase." For a new device, always choose the first option.

  • Ledger Live will prompt you to choose a PIN code.
  • Your device screen will show you a numerical keypad. Use the buttons on your Ledger device to select and confirm your PIN.

Step 5: Set Your PIN Code

The PIN code is a 4-to-8 digit number that provides an essential layer of physical security. It prevents unauthorized access to your device. You will enter this PIN on the Ledger device's screen itself, not on your computer. This method is immune to keyloggers and other malware.

You'll be asked to set your PIN and then confirm it. Remember this PIN. If you forget it, you can recover your wallet using your recovery phrase, but you will lose the PIN. Incorrectly entering the PIN three times will factory reset the device, requiring you to restore it with your recovery phrase.

Step 6: The 24-Word Recovery Phrase

This is the most critical step in your entire crypto journey. Your 24-word recovery phrase is your master key. It's the only backup of your funds. It is generated securely and offline by your Ledger device.

Your Ledger device screen will now display the 24 words of your recovery phrase, one by one. You must write each word down precisely in the correct order on the blank Recovery Sheets provided in your box.

  • Do not take photos of the words.
  • Do not type them into your computer or phone.
  • Do not store them in a cloud service, email, or password manager.
  • Keep the physical cards in a safe, secure location (a fireproof safe, a safe deposit box, etc.).

After you have written down all 24 words, the device will ask you to verify them by re-entering a few words to confirm that you have recorded them correctly. You will use the buttons on your Ledger to navigate and select the words. This final verification is a chance for you to double-check your work and ensure you have an accurate, readable copy of your recovery phrase.

Step 7: Finalizing Setup and Installing Crypto Apps

Once you have successfully verified your recovery phrase, your device is ready. The Ledger Live app will now prompt you to install cryptocurrency applications on your device. Unlike a software wallet, your Ledger must have a small application installed for each cryptocurrency you wish to manage (e.g., Bitcoin app, Ethereum app).

These apps are just tiny programs that enable your Ledger to communicate with the respective blockchain; they do not store your private keys. The number of apps you can have installed at once depends on your Ledger model. The Ledger Live manager will show you a list of available apps. Simply select the ones you need and click "Install."

Step 8: Receiving and Sending Assets

With your setup complete and apps installed, you can now receive your first assets.

  • In Ledger Live, navigate to your desired crypto account and click **Receive**.
  • Ledger Live will generate a public address for you to receive funds. For your security, the app will ask you to **verify this address on your Ledger device screen**. You must do this to ensure the address has not been tampered with by malware.
  • Once you have verified that the address on your computer screen matches the one on your device, you can copy the address or scan the QR code to send assets to it.

To send assets, you'll perform a similar process. Enter the recipient's address and the amount in Ledger Live, and your device will again prompt you to verify the transaction details on its screen. Only when you physically press the buttons on your device to confirm will the transaction be signed and broadcast to the network. This is the core security feature of a hardware wallet: you are always in full control.

Essential Security Best Practices with Ledger

Your hardware wallet is only as secure as your habits. Always follow these simple but crucial rules.

1. Your Recovery Phrase is Sacred

This is your master key. Never share it with anyone, ever. Ledger Support will **never** ask for it. Anyone who has your recovery phrase owns your funds.

2. Verify Everything on Your Device

Always confirm all transaction and receiving addresses on the Ledger device's screen. A compromised computer can alter data, but it cannot alter what is shown on the Ledger's physical display.

3. Use Only Official Software

Only download Ledger Live and firmware updates from the official Ledger website, `Ledger.com`. Do not use links from emails, social media, or search results.

Frequently Asked Questions

What if my Ledger device is lost or stolen?

Your funds are not stored on the device, but on the blockchain. You can recover your wallet on a new Ledger (or another compatible wallet) using your 24-word recovery phrase.

Can my Ledger be hacked?

The Ledger hardware itself is designed to be unhackable. Your funds are only at risk if you expose your 24-word recovery phrase, or if you sign a malicious transaction without verifying it on the device's screen.

Why do I have to install apps for each coin?

Each cryptocurrency uses a different blockchain protocol. The apps on your Ledger device are small, isolated programs that enable your device's secure element to communicate with each specific blockchain. This ensures that the code for each coin is separate and secure.