Getting started safely with Ledger
A short, focused guide to help you understand what Ledger is, how to begin using it, and — most importantly — how to keep your recovery credentials and crypto assets safe.
What is Ledger?
Ledger is a hardware wallet family designed to store the private keys used to access cryptocurrencies offline. The device isolates your signing keys from internet-connected devices, significantly reducing the risk of remote compromise. Treat the physical device and your recovery information as the highest level of control for your funds.
Before you begin
Prepare a secure, private environment with minimal distractions. Ensure you are using Ledger's official website and official apps — always verify the domain in your browser and avoid downloading software from unfamiliar links.
Safety checklist
Buy from official channels
Purchase devices directly from the manufacturer's website or authorized resellers. Devices from unknown sources may have been tampered with.
Verify the packaging and ledger ID
On arrival, inspect tamper-evident seals and confirm device identifiers match the documentation. If something looks off, contact support rather than proceeding.
Create your recovery in private
Write your recovery phrase only on the provided recovery sheet or a durable, offline medium. Never store the recovery phrase digitally or photograph it.
Never share your recovery phrase
No legitimate service, support agent, or software will ever ask for your full recovery phrase. Treat such requests as scams.
Use a strong PIN
Choose a PIN that isn't easy to guess. The PIN protects the device itself if it’s lost or stolen.
Keep backups safe
Make two backups of your recovery phrase and store them in separate secure locations (e.g., a safe and a safety deposit box).
Update firmware thoughtfully
Only update firmware using the official Ledger app and confirm updates come from the device maker.
Beware of phishing
Phishing websites and messages try to trick you into entering sensitive information. Check URLs carefully and use bookmarks for important sites.
Common setup pitfalls
Some common mistakes include typing recovery words on a computer, sharing screenshots of your recovery phrase, using weak or repeated PINs, and relying on insecure cloud backups. Avoid these to maintain strong, long-term security.
When something goes wrong
If you suspect your device or recovery has been compromised, move quickly: transfer funds to a new secure wallet with a freshly generated recovery phrase and reach out to official support channels. Do not follow instructions from unknown individuals who claim to be able to recover your assets.