Getting started safely with Ledger

A short, focused guide to help you understand what Ledger is, how to begin using it, and — most importantly — how to keep your recovery credentials and crypto assets safe.

What is Ledger?

Ledger is a hardware wallet family designed to store the private keys used to access cryptocurrencies offline. The device isolates your signing keys from internet-connected devices, significantly reducing the risk of remote compromise. Treat the physical device and your recovery information as the highest level of control for your funds.

Before you begin

Prepare a secure, private environment with minimal distractions. Ensure you are using Ledger's official website and official apps — always verify the domain in your browser and avoid downloading software from unfamiliar links.

Safety checklist

1

Buy from official channels

Purchase devices directly from the manufacturer's website or authorized resellers. Devices from unknown sources may have been tampered with.

2

Verify the packaging and ledger ID

On arrival, inspect tamper-evident seals and confirm device identifiers match the documentation. If something looks off, contact support rather than proceeding.

3

Create your recovery in private

Write your recovery phrase only on the provided recovery sheet or a durable, offline medium. Never store the recovery phrase digitally or photograph it.

4

Never share your recovery phrase

No legitimate service, support agent, or software will ever ask for your full recovery phrase. Treat such requests as scams.

Use a strong PIN

Choose a PIN that isn't easy to guess. The PIN protects the device itself if it’s lost or stolen.

Keep backups safe

Make two backups of your recovery phrase and store them in separate secure locations (e.g., a safe and a safety deposit box).

Update firmware thoughtfully

Only update firmware using the official Ledger app and confirm updates come from the device maker.

Beware of phishing

Phishing websites and messages try to trick you into entering sensitive information. Check URLs carefully and use bookmarks for important sites.

Common setup pitfalls

Some common mistakes include typing recovery words on a computer, sharing screenshots of your recovery phrase, using weak or repeated PINs, and relying on insecure cloud backups. Avoid these to maintain strong, long-term security.

When something goes wrong

If you suspect your device or recovery has been compromised, move quickly: transfer funds to a new secure wallet with a freshly generated recovery phrase and reach out to official support channels. Do not follow instructions from unknown individuals who claim to be able to recover your assets.

This article is for informational purposes only and does not replace official documentation. Always consult the manufacturer's official resources for the most up-to-date guidance.