Official Site® | Ledger.com/Start® | Getting started

A concise, emoji-friendly presentation to help new users set up their Ledger device with confidence and clarity.

Welcome 👋

Thank you for choosing a Ledger hardware device. This quick guide uses simple steps, friendly emojis, and clear language to walk you through unboxing, setup, securing your recovery phrase, and performing a first test transaction. Follow these steps to create a safe, reliable routine for managing your crypto assets.

Quick Start Steps 🚀

📦
Unbox — Inspect packaging for tamper evidence and confirm included accessories. If anything looks unusual, stop and contact support.
🔌
Connect — Power your device and connect to a trusted computer or mobile device. Open the official start URL and follow the on-screen prompts.
🔐
Create a PIN — Choose a PIN you can remember but that others cannot guess. Avoid simple patterns and never share your PIN.
✍️
Record Recovery Phrase — Write down the recovery words exactly and in order. Store this phrase offline in a secure location; never photograph or store it digitally.
Verify & Test — Confirm the device is authentic, complete an optional restore test, and send a small test transaction to verify everything works.

Security Essentials 🔒

Ledger devices keep private keys offline so they cannot be accessed by malware on your computer. That said, your personal practices matter most. Treat the recovery phrase like cash: if someone obtains it, they can control your funds. Use a fireproof storage option, avoid cloud backups, and consider a metal seed plate for durability.

Phishing awareness — Always verify the domain name, check the TLS padlock for the official site, and never follow links from unsolicited messages. If a website or support request asks for your recovery phrase, it is a scam.

Practical Tips 🧭

  • Use a dedicated device for high-value transactions when possible.
  • Keep firmware and companion apps updated to the latest official versions.
  • Practice recovery in a low-risk environment to build confidence.

If you manage funds for others or run an organization, create a clear custody policy and document the recovery process so responsibilities are unambiguous.

Common Questions ❓

Q: What if I lose my recovery phrase?
A: Without the recovery phrase you will likely lose access to your funds. Create multiple secure backups and store them in separate, geographically distinct locations.

Q: Can Ledger recover my funds for me?
A: No. Ledger cannot access or restore your private keys — the recovery phrase is your responsibility.

Detailed walkthrough 🛠️

Step-by-step: After powering the device, use the official Ledger setup flow. Choose a PIN that is long enough to resist guessing but memorable to you. When shown the recovery phrase, do not copy it digitally. Read each word carefully, write words in order, and double-check spelling. After the initial setup, perform the official device verification and a small transfer to ensure keys sign correctly.

Keep a log of firmware versions and the date when you performed the setup. This helps if you need to audit the device state later or troubleshoot with official support.

Example scenario: Alice's first setup 👩‍💻

Alice follows the steps: she inspects the sealed box, connects the device, and sets a PIN. She writes the recovery phrase on a paper card, then engraves a copy on a metal plate for durability. She stores one copy in a home safe and another in a bank deposit box. A month later, she practices a mock restore to confirm the process works. This combination of preparation and testing gives Alice confidence and reduces risk.

Glossary & New Words ✨

Seedguard — a durable physical backup for recovery words, such as a stamped metal plate. Phishproof — measures or behaviors designed to prevent phishing attacks, like manual URL verification. Keyshadow — a temporary, low-risk signing token used for test operations that does not expose the main private key.

These terms help teams communicate security practices quickly and create standard operating procedures for managing keys and recovering accounts.

Best Practices Checklist ✔️

  • Create at least two offline backups of your recovery phrase and keep them separate.
  • Use tamper-evident storage for recovery materials.
  • Never enter your recovery phrase on a website or share it with anyone, even support representatives.
  • Review and update your device firmware only from official sources.
  • Document custodial responsibilities if managing assets for others.