1. Threat model — decide what you’re protecting against
Before setup, take a moment to choose a threat model. Common scenarios:
- Casual online attackers (malware, phishing) — focus on firmware verification, never entering your seed digitally.
- Physical theft or opportunistic access — use a strong PIN and store device/seed separately.
- Targeted/insider threats — consider passphrases, steel backups, and multisig arrangements.
Your choices (passphrase, multisig, geographic duplicates) should reflect the value you protect and realistic risks in your environment.
2. Unboxing & initial inspection
When the package arrives:
- Verify tamper seals and that packaging is intact.
- Confirm that accessories (USB cable, recovery sheets, quick guide) match what is documented for your model.
- Keep the box until setup is complete and you have recorded the recovery phrase safely.
If anything looks altered or suspicious, do not set up the device — contact official support or the vendor.
3. Prepare your environment
Use a personal, up-to-date computer. Avoid public/shared PCs for initialization. Prefer a freshly updated OS with security patches. Where extreme caution is required, consider a dedicated clean machine or a live OS for setup.
4. Installing Ledger Live (official companion app)
Ledger Live is the official application that manages device pairing, firmware updates, app installation, account creation, and transactions. Steps to install:
- Download Ledger Live from the official source for your operating system.
- Verify the installer integrity using checksums or signatures if available.
- Install the app, open it, and choose Get started.
If you already use Ledger Live on another trusted device, you can reuse it — the hardware device and recovery phrase are the source of truth.
5. Firmware verification and updates
When you first connect, Ledger Live will detect the device and may prompt for firmware updates. Firmware updates fix security issues and add features; but only update using the official app interface.
- Start the update only when connected directly to Ledger Live.
- The device will require physical confirmation for critical operations — always read on-device messages.
- If an update fails or stalls, follow official recovery flows; don't use third-party tools.
6. Initializing the device — create new or restore
Choose Create new device if this is your first setup, or Restore device if you have an existing recovery phrase.
Creating a new device — secure steps
- Power the device and follow on-device prompts to set language and model.
- Choose a strong PIN; the device will display a randomized keypad for entry.
- The device generates a recovery phrase (24 words typical). Write them down on the supplied recovery sheets, in order, using a pen. Confirm when prompted.
- Pair with Ledger Live to finish onboarding and install blockchain apps.
7. PIN selection & device access
Choose a PIN that is not guessable; avoid birthdays, repeated digits, or simple sequences. Memorize the PIN — do not store it with the recovery phrase. The PIN protects the device from local access, but not from seed-based recovery, so treat both carefully.
8. Understanding the recovery phrase and passphrase
The recovery phrase (seed) is the universal backup. It reconstructs your keys on any compatible wallet. Optionally, a passphrase acts as a 25th word and creates hidden wallets derived from the same seed.
- Passphrases add plausible deniability and privacy, but raise complexity.
- If you use a passphrase, store it with the same care as the seed — losing it means losing associated funds.
- Test restoring from seed (+ passphrase when used) on a secondary device before moving large amounts.