Lédger.com/Start® — Getting Started

A thorough, user-friendly guide to set up your Ledger hardware wallet securely and begin managing your assets.
Ledger • Start

Welcome — a practical introduction

Congratulations on choosing a Ledger hardware wallet. Hardware wallets keep your private keys offline, requiring physical confirmation for transactions and significantly reducing exposure to online threats. This guide walks you through unpacking, setting up, securing your recovery, daily usage, and best practices for long-term custody. Read each section carefully and never skip the recovery backup step — it is the single most important security action.

Unboxing & verifying the package

Start by inspecting the packaging. Ledger devices ship sealed with tamper-evident stickers. If seals appear broken, damaged, or altered, do not use the device and contact the vendor or official support. Inside you should find the device, USB cable, keychain or lanyard, and a recovery sheet. Never accept a device with a pre-filled recovery sheet.

Install Ledger Live — official companion app

Download Ledger Live from the official Ledger website only. Avoid links from emails, social media, or third-party sites. When available, verify the installer using checksums or signatures provided by Ledger. Install the app and launch it. Ledger Live provides an interface to manage accounts, install app modules for different blockchains, and install firmware updates. It also handles verified firmware updates to your device.

Create a new device or restore

When first connecting, Ledger Live will guide you to create a new wallet or restore from an existing recovery phrase. If creating new, the device will generate a 24-word recovery phrase (BIP39-like) and display it on the device screen. Write those words exactly in order on the recovery sheet provided or on a durable backup solution. Never store the recovery phrase on your computer, phone, or cloud storage.

Pro tip: consider a metal backup plate for long-term durability against fire and water damage.

Set a PIN and enable additional protections

Choose a secure PIN to unlock the device. The PIN prevents unauthorized local access. Ledger devices also support passphrases, which add an additional secret and create hidden wallets. Use passphrases with care: they provide strong protection but increase the risk of permanent loss if forgotten. Decide if a passphrase is appropriate for your threat model.

Install apps and manage accounts

Ledger devices use small blockchain-specific apps to support different currencies. Use Ledger Live's Manager to install only the apps you need. Each app consumes device memory; uninstalling an app does not delete your funds — accounts are derived from your recovery seed. After installing apps, add accounts in Ledger Live to view and manage balances.

Receiving and verifying addresses

When receiving funds, always copy the receiving address from Ledger Live and then verify the full address on your device's screen before sharing it. Verification on-device ensures that a compromised host cannot substitute an attacker-controlled address. For high-value transfers, do a small test transaction first.

Sending and on-device confirmation

When sending assets, Ledger Live prepares the transaction but the device will display the destination address, amount, and fees. Carefully verify these details on the hardware display and only approve if they match your intentions. On-device verification is the final safeguard against malware altering transaction data on the host computer.

Firmware updates and supply chain safety

Keep your device firmware up to date using Ledger Live. Firmware updates often include security enhancements. Ledger signs firmware updates and Ledger Live verifies signatures before applying them. Never install firmware from unverified sources or third-party tools. If an update fails, consult official support rather than attempting risky workarounds.

Backup, recovery, and lost device procedures

If you lose access to your device, your recovery phrase allows you to restore funds on another compatible hardware or software wallet that supports the same derivation standard. Store the phrase offline, in multiple secure locations, and consider distributing backups across trusted locations. Never reveal your recovery phrase to anyone — no legitimate support agent will ever ask for it.

Troubleshooting common issues

If the device isn't detected, try a different USB cable or port, restart Ledger Live, or reboot your computer. For persistent detection issues, reinstall Ledger Live from the official site. If you experience firmware or app installation errors, follow the official troubleshooting guides and reach out to Ledger Support if necessary. Avoid third-party recovery services or software that promise to 'fix' your device.

Advanced: privacy, coin control, and third-party integrations

Ledger supports integrations with many third-party wallets and DeFi dApps via secure bridging tools. When connecting to a third-party service, verify the domain and prefer official integrations documented by Ledger. Consider privacy-enhancing practices like address rotation and coin control when managing UTXO-based assets like Bitcoin.

This guide provides a practical start and best practices but does not replace official documentation. For downloads, signature verification, firmware, and support, always consult the official Ledger website.

Ledger Live | Download and Install Ledger