✨ Made with Daftpage

Welcome to Your Ledger Journey

Welcome to the first step toward securing your digital assets. Ledger.com/Start is your central hub for getting your new Ledger device ready for action. This guide will walk you through the simple, essential process of setting up your hardware wallet, creating your unique safety net, and making your first transactions. Think of your Ledger as a personal, unbreakable vault for your cryptocurrencies, and this is the manual for its operation.

Unboxing Your New Level of Security

When you open your Ledger box, you will find your Ledger Nano device (S Plus, X, or Stax), a USB-C cable, a recovery sheet, and perhaps some keychain straps. The most important items are the device itself and the recovery sheet. Before you plug anything in, take a moment to ensure the box's seal was intact and all contents are present. Your security journey begins with this physical check.

The First Power-On: Setting Your PIN

Connect your Ledger device to your computer or a power source using the provided cable. The device will instantly wake up. The first and most critical step is to set a strong PIN code. This PIN is your first line of defense, acting like the code on a physical safe. Choose a code that is at least 4 digits long, but we strongly recommend using 6 or 8 digits for enhanced security. Anyone who gets hold of your device cannot access it without this PIN. You will have three attempts to get it right before the device resets itself, protecting your assets from brute-force attacks.

Your Golden Key: The 24-Word Recovery Phrase

This is the single most important concept in self-custody. Your device will now generate a unique 24-word list known as your Recovery Phrase, or Secret Recovery Phrase. This is not a suggestion; it is a mandatory part of the setup.

Write these 24 words down by hand on your included recovery sheet, in the exact order they appear on the screen. This phrase is a master key to your entire crypto portfolio. It is what allows you to recover your funds if your Ledger device is lost, stolen, or broken. It is paramount that you never, ever type this phrase on a computer or phone, take a digital photo of it, or store it in the cloud. The only safe place for it is written down on paper or etched on metal, stored securely like you would a priceless heirloom or a passport.

How to Use Your Ledger with Ledger Live

Your Ledger device is the secure vault, but you need an interface to see inside it and manage your assets. That interface is Ledger Live, our free companion application.

First, download Ledger Live only from the official Ledger.com website. Install it on your computer or smartphone. Open the application and follow the on-screen prompts to "Set up a new device." Ledger Live will guide you through checking your device's authenticity—a crucial step to ensure you have a genuine, untampered Ledger product.

Once your device is verified and connected, you can use Ledger Live to install apps for the specific cryptocurrencies you own, like Bitcoin or Ethereum. These apps are small and allow your Ledger device to manage those different blockchains.

How to Use Your Ledger for Receiving Crypto

To receive crypto, open Ledger Live and navigate to the account you want to receive to. Click "Receive." The application will ask you to connect and unlock your Ledger device to verify the transaction. Your device will display the receiving address. You must physically confirm on the device's screen that this address matches the one shown in Ledger Live. This double-check ensures that no malware on your computer can alter the address. Once confirmed, use that address to send funds from your exchange or another wallet.

How to Use Your Ledger for Sending Crypto

To send crypto, go to the account in Ledger Live and click "Send." Enter the recipient's address and the amount. After you confirm the details in Ledger Live, the application will generate a transaction for you to verify on your Ledger device. Connect and unlock your device. You will see the transaction details on the small screen. Scrolling through, you can check the recipient address and the amount. You must physically press the buttons on the Ledger device to both approve and finally sign the transaction. This action proves that the transaction was authorized by the private keys secured inside your device.

A Unique Advantage: The Secure Element

Unlike many software wallets or less secure hardware options, Ledger devices contain a certified Secure Element chip. This is the same type of chip found in passports and credit cards. It is designed to be physically resistant to tampering and is a fortified vault within your vault, specifically built to shield your private keys from both physical and remote attacks. This is a core part of what makes a Ledger, a Ledger.

Disclaimer

The information provided on this page is for educational and informational purposes only. It is not intended as financial, legal, or investment advice. You should consult with a qualified professional for such guidance. Cryptocurrencies are volatile and involve a high degree of risk. The security of your assets is ultimately your responsibility. Safeguarding your PIN and 24-word Recovery Phrase is critical; Ledger cannot recover them for you if they are lost. Always ensure you are downloading Ledger Live from the official Ledger.com website to avoid phishing scams. Ledger assumes no liability for any loss or damage resulting from the use or misuse of its products and services.