Get started with Ledger

A practical, plain-language introduction to hardware wallets, setup, and safe everyday habits. Read the guide below; when you're ready, use the single Login button to start the secure sign-in flow.

Hardware wallets provide a simple, effective barrier between your private keys and the online world. Instead of storing secret keys on a computer or phone that runs many applications and connects to the internet, the private keys remain inside a small, dedicated device. Signing operations occur on the device itself and are verified on its built-in screen. This two-channel approach — host software on one side and a secure device display on the other — makes it much harder for malware or phishing attacks to trick you into signing a transaction you did not intend to sign.

When you first set up a hardware device you choose a PIN and either generate a new recovery phrase or restore from an existing one. The recovery phrase (a sequence of words) is the master backup for your wallet: it can recreate your accounts if the device is lost, damaged, or stolen. Because the recovery phrase grants full access to funds, handle it with extreme care. Write it physically on paper or store it using durable offline media. Avoid digital copies such as photos, screenshots, cloud notes, or email. Those digital forms are vulnerable to remote theft.

Choose a PIN that is easy for you to remember but hard for others to guess. Do not write the PIN on the same paper as the recovery phrase. Separating knowledge (PIN) from possession (device) and backup (recovery phrase) increases security. If your device supports optional passphrases or advanced features, learn how they work before enabling them—these features can add protection but also increase complexity in recovery and usage if not managed correctly.

Ledger Live is the companion application used to manage accounts, check balances, install apps on the device, and apply official firmware updates. Ledger Live communicates with the hardware wallet to request signatures but it never exposes private keys. For every transaction or approval, confirm details on the device screen: verify recipient addresses, amounts, and any contract information before approving. Because attackers can manipulate host software or browsers, the device display is the trusted source of what you actually sign.

Keep firmware and applications up to date through the official companion app. Firmware updates improve security and add compatibility for new assets. Only install updates from official sources, and follow on-device prompts exactly. If an update prompt appears in an unexpected context or asks for unusual access, pause and verify the update's authenticity through official support channels. Properly managed updates reduce exposure to known vulnerabilities and keep your device functioning smoothly.

Phishing remains a leading cause of compromises. Attackers create convincing fake websites, emails, and messages that impersonate legitimate services. Never share your recovery phrase—no legitimate support team will ever ask for it. Use bookmarks for official sites, check URLs carefully, and be wary of urgent-sounding messages that pressure you to take immediate action. Use unique passwords across services and enable two-factor authentication where possible to protect associated accounts like email or exchanges.

When interacting with decentralized applications (dApps) and smart contracts, proceed cautiously and test with small sums first. Smart contract approvals can grant contracts the ability to move tokens on your behalf, so review the scope and duration of any permission you grant. Use dedicated accounts for experimental activity to avoid exposing your main holdings. Periodically review and revoke approvals you no longer need to reduce long-term exposure.

Operational security goes beyond the hardware device. Protect backups by storing them in secure locations and consider geographic separation for high-value holdings. Document recovery procedures for trusted executors and consider legal guidance for estate planning. For organizations or high-value custody, multi-signature setups and role-based access help distribute trust and avoid single points of failure. Regular drills and documented processes ensure recovery steps work in practice when stress is high.

Plan your mix of convenience and security. Many users keep a small spending balance in a hot wallet for routine transactions while storing the majority of assets in a hardware-secured wallet. Reevaluate this arrangement periodically as holdings and usage patterns change. Test recovery procedures to ensure you can recreate access from backups. If you suspect compromise—suspicious prompts, unknown transactions, or leaked backups—move funds to a newly generated wallet immediately to reduce the window of opportunity for attackers.

Staying informed is part of security. Follow official documentation, verify installers, and consult reputable resources when exploring new features or tokens. When in doubt, seek advice from official support. This page provides a practical foundation to help you get started with Ledger securely. It is not exhaustive, but it covers everyday habits and key steps that protect most users. When you are ready to proceed, use the single Login button below to begin the secure sign-in flow; the device and companion app will guide you through connecting your hardware, entering your PIN, and confirming any required actions on-device.

Account access
Click the button below to begin the secure login flow. Ledger Live and your device will prompt you to connect your hardware, enter your PIN, and confirm any necessary actions on the device screen.