Official Site® | Ledger.com/Start®

Getting started — official onboarding, guides, and support

Official Site® | Ledger.com/Start® | Getting started (H1)

Welcome to the official Ledger start page. This guide provides clear, user-friendly steps to help you set up your Ledger device, understand core security concepts, and use Ledger Live with confidence. The page is presented in multiple formats — compact quickstart, narrative walkthrough, annotated technical reference, and FAQ — so you can pick the view that suits you best.

Step 1
Estimated time: 10–20 minutes

Quickstart (Compact)

A short checklist that gets you from box to secure wallet in a few focused steps. Ideal for people who are comfortable following straightforward instructions.

  1. Unbox your Ledger device and verify tamper-evident seals.
  2. Download Ledger Live from the official site and install the desktop or mobile app.
  3. Initialize your device: choose a PIN and safely write down your recovery phrase on the supplied recovery sheet.
  4. Install the apps for the cryptocurrencies you plan to use via Ledger Live.
  5. Receive a small test amount to verify address correctness and confirm transactions.

Pro tip: Always verify the receiving address on the device screen itself — never trust addresses displayed solely by a computer or phone app.

Why this matters

Hardware wallets like Ledger store cryptographic keys offline in a secure element, significantly reducing exposure to remote theft. The recovery phrase is the ultimate fallback: anyone who holds it can recreate your wallet. Treat it like the single most sensitive piece of information you own.

  • Security model: private keys never leave the device.
  • Recovery: the 24-word phrase restores access if the device is lost (or destroyed).
  • Phishing defense: physical confirmations on the device prevent remote tampering.

Full walkthrough (Narrative)

This step-by-step walkthrough explains not only what to do but also why. It helps you develop good habits to protect your assets and maintain long-term access. Follow each step attentively and pause if a prompt looks unfamiliar or suspicious.

1. Unboxing and verification

When you receive your Ledger device, check the packaging carefully. The box should have official Ledger branding and a tamper-evident seal. If anything looks altered or you're missing the recovery sheet, contact official support on Ledger.com rather than proceeding. Ledger devices are shipped with a sealed box and a physical recovery card. Always prefer purchases from authorized resellers or the official store to avoid counterfeit products.

2. Download Ledger Live

Only install Ledger Live from the official Ledger website (ledger.com). Ledger Live is the companion application used to manage apps on your device, perform firmware updates, and interact with networks. Choose the desktop or mobile version according to your workflow. Never download apps that claim to be "modified" or "hacked" versions — they often contain malware or backdoors.

3. Initialize the device

Power on your Ledger and choose to set up as a new device. You will pick a PIN code; choose something memorable but not trivial. The device will then display your recovery phrase — 24 words shown one by one. Write these words exactly as displayed on the supplied recovery sheet and keep that sheet in a safe, offline location. Do not photograph or store the phrase on any internet-connected device. Ledger staff will never ask for your recovery phrase; any request for it is a red flag.

4. Install apps and accounts

Use Ledger Live to install blockchain-specific apps (Bitcoin, Ethereum, etc.) onto your device. Once the app is installed, create an account in Ledger Live to display balances and transaction history; the actual keys remain on your device. When receiving funds, always verify the address shown in Ledger Live against the address displayed on your device screen, confirming both the full address and a checksum whenever possible.

5. Perform a verification transaction

Send a small test amount from an exchange or web wallet to your Ledger address and confirm the funds arrive. This helps you validate addressing and ensures that your setup works end-to-end before moving larger amounts. After verifying, you can send larger transfers with confidence.

6. Maintenance and firmware updates

Periodically check Ledger Live for firmware updates. Ledger may release updates that include security fixes, new features, or support for new coins. Update only through Ledger Live or the official instructions. During updates, the device may prompt for confirmations; follow on-screen guidance carefully.

Annotated technical reference

Technical readers may prefer annotations that explain the internal mechanisms and best practices for integrations. Below are important technical notes and references.

Key storage and the secure element

Ledger devices contain a secure element (SE), a tamper-resistant chip that stores private keys and performs cryptographic operations. The SE isolates private key material from the host environment (computer or phone), ensuring signatures are produced on the device and cannot be extracted by software alone.

Device attestation and authenticity

Ledger devices include attestation certificates that allow compatible software or services to verify a genuine Ledger product. Attestation helps integrations detect counterfeit devices and prevents certain classes of supply chain attacks when implemented correctly.

Interacting via Ledger Live and third-party apps

Ledger Live interacts with the device via USB or Bluetooth (for supported models). Third-party wallets can use the device through established protocols (like WebHID, WebUSB, or Bluetooth) and ensure the on-device confirmations prevent address manipulation. When using third-party apps, verify the app's provenance and permissions, and prefer widely-reviewed clients with active community support.

Compact checklist for teams

If you manage multiple devices (for an organization or team), use this compact checklist for provisioning and policy enforcement.

  1. Record device serial numbers and associate them with owners.
  2. Use centralized inventory and access policies to control who can use which device.
  3. Adopt multi-signature architectures when multiple approvals are required for large transfers.
  4. Securely store backup recovery phrases in geographically separated locations using safe deposit boxes or encrypted hardware vaults.
  5. Document recovery procedures and perform periodic drills to ensure operational readiness.

Different presentation formats

This site offers the same core information in multiple presentation formats to meet different learning styles and operational needs:

  • Compact Quickstart: Short, action-oriented steps for experienced users.
  • Narrative Walkthrough: Full explanations that build mental models for newcomers.
  • Annotated Technical Reference: Deeper details for auditors and integrators.
  • FAQ & Troubleshooting: Rapid answers to common problems and safety checks.

FAQ & Troubleshooting

Q: I lost my Ledger device. What should I do?

A: If you have your recovery phrase, you can restore access on a new Ledger or compatible hardware wallet. If you do not have the recovery phrase, funds cannot be recovered. For accounts where additional protections exist (multi-sig, custodial recovery), follow organizational procedures. Revoke any linked sessions and notify relevant services to watch for suspicious activity.

Q: Someone is asking for my recovery phrase — is this normal?

A: No. Ledger staff and legitimate support will never ask for your recovery phrase. If anyone requests it, treat it as a phishing attempt. Do not enter your phrase into websites, apps, or chat.

Q: How do I verify a receiving address?

A: Always verify the full receiving address on your Ledger device's screen before sending funds. The device displays the address as it will be used on-chain; software wallets may show modified addresses due to malware. Confirm the address characters and checksum if visible.

Safety checklist

A short set of safety rules to reduce risk while managing private keys and devices.

  1. Never share your recovery phrase with anyone.
  2. Use a PIN code on your device and enable passphrase features if you require an additional layer.
  3. Prefer hardware storage for large holdings and keep only smaller amounts on hot wallets for frequent transactions.
  4. Keep firmware up to date and verify updates through Ledger Live.
  5. Use multi-signature setups for organizational controls and high-value stores.

Examples & Use Cases

Ledger devices support a range of use cases for individuals and organizations. Below are practical examples and recommended practices for each.

Personal savings

For long-term holdings, keep the majority of funds in hardware wallets and store the recovery phrase in secure offline locations. Consider splitting the recovery phrase between trusted vaults or using specialized metal backup plates designed to resist fire and water damage.

Active trading

If you trade frequently, keep an operational hot wallet for small balances while holding the majority in cold storage. Use exchanges and custodial services with caution, and prefer withdrawing to your Ledger when not actively trading.

Organizational treasury

Organizations should consider multi-signature architectures that distribute signing authority across multiple devices or individuals. Ledger devices can be part of a multi-sig scheme using software wallets that support co-signer hardware devices.

Developer & Integration notes

Developers building integrations with Ledger devices should adhere to security best practices. These notes are for integrators and assume familiarity with standard crypto tooling.

APIs and protocols

Interfacing with devices generally uses established transport layers (WebUSB, WebHID, Bluetooth) and standardized message formats. Ensure your integration requests explicit user confirmations for sensitive actions and validate attestation data when available.

Testing and QA

Use test networks for development and encourage users to verify addresses and transaction details on-device. Keep your integration's dependencies up-to-date and monitor for security advisories related to the transport stacks you rely on.

Visual walkthroughs

For visual learners, we include diagrams and annotated screenshots (where appropriate) that show key steps like connecting the device, confirming an address, and checking transaction details on-screen.

  1. Connect device to computer or pair via Bluetooth where supported.
  2. Open Ledger Live and navigate to Manager to install apps.
  3. Open the appropriate app (e.g., Bitcoin) on your device to view addresses and confirm transactions.

Printable checklist

A condensed checklist formatted for printing and keeping with your device box. Perfect for leaving in a safe alongside your recovery materials.

  • Verify package seals • _______
  • Device serial: _______
  • PIN chosen: _______ (do not store with recovery phrase)
  • Recovery phrase stored in: _______
  • Ledger Live installed on device(s): _______

Advanced topics

For users and teams that require advanced security postures, consider the following topics and how they apply to your threat model.

Passphrase (25th word) feature

Ledger devices support an optional passphrase that extends the recovery phrase to create multiple hidden wallets. This is a powerful feature but introduces additional operational complexity: losing the passphrase means losing access to funds in that hidden wallet. Use passphrases only if you understand the trade-offs and maintain secure backup procedures.

Multi-signature deployments

For high-value custody, multi-signature schemes distribute signing authority and reduce single-point-of-failure risk. Combine Ledger hardware devices with a software layer (e.g., a co-signer service or multisig wallet) that enforces quorum rules for transactions.

Air-gapped workflows

Some advanced users prefer air-gapped setups where the signing device is never connected directly to an internet-facing computer. Instead, transaction data is transported via QR codes or SD cards between online and offline machines. This reduces remote attack surface but increases operational complexity during signing and verification.

Support & resources

Official support channels and community resources can help troubleshoot issues. For anything related to device authenticity, lost recovery phrases, or firmware updates, prefer official ledger.com resources and contact channels listed on the site.

© 2025 Ledger — Official start guide. This page is informational; always verify details and downloads on ledger.com.
Privacy Terms
Official Site® | Ledger.com/Start® | Getting started

Official Site® | Ledger.com/Start®

Getting started — official onboarding, guides, and support

Official Site® | Ledger.com/Start® | Getting started (H1)

Welcome to the official Ledger start page. This guide provides clear, user-friendly steps to help you set up your Ledger device, understand core security concepts, and use Ledger Live with confidence. The page is presented in multiple formats — compact quickstart, narrative walkthrough, annotated technical reference, and FAQ — so you can pick the view that suits you best.

Step 1
Estimated time: 10–20 minutes

Quickstart (Compact)

A short checklist that gets you from box to secure wallet in a few focused steps. Ideal for people who are comfortable following straightforward instructions.

  1. Unbox your Ledger device and verify tamper-evident seals.
  2. Download Ledger Live from the official site and install the desktop or mobile app.
  3. Initialize your device: choose a PIN and safely write down your recovery phrase on the supplied recovery sheet.
  4. Install the apps for the cryptocurrencies you plan to use via Ledger Live.
  5. Receive a small test amount to verify address correctness and confirm transactions.

Pro tip: Always verify the receiving address on the device screen itself — never trust addresses displayed solely by a computer or phone app.

Why this matters

Hardware wallets like Ledger store cryptographic keys offline in a secure element, significantly reducing exposure to remote theft. The recovery phrase is the ultimate fallback: anyone who holds it can recreate your wallet. Treat it like the single most sensitive piece of information you own.

  • Security model: private keys never leave the device.
  • Recovery: the 24-word phrase restores access if the device is lost (or destroyed).
  • Phishing defense: physical confirmations on the device prevent remote tampering.

Full walkthrough (Narrative)

This step-by-step walkthrough explains not only what to do but also why. It helps you develop good habits to protect your assets and maintain long-term access. Follow each step attentively and pause if a prompt looks unfamiliar or suspicious.

1. Unboxing and verification

When you receive your Ledger device, check the packaging carefully. The box should have official Ledger branding and a tamper-evident seal. If anything looks altered or you're missing the recovery sheet, contact official support on Ledger.com rather than proceeding. Ledger devices are shipped with a sealed box and a physical recovery card. Always prefer purchases from authorized resellers or the official store to avoid counterfeit products.

2. Download Ledger Live

Only install Ledger Live from the official Ledger website (ledger.com). Ledger Live is the companion application used to manage apps on your device, perform firmware updates, and interact with networks. Choose the desktop or mobile version according to your workflow. Never download apps that claim to be "modified" or "hacked" versions — they often contain malware or backdoors.

3. Initialize the device

Power on your Ledger and choose to set up as a new device. You will pick a PIN code; choose something memorable but not trivial. The device will then display your recovery phrase — 24 words shown one by one. Write these words exactly as displayed on the supplied recovery sheet and keep that sheet in a safe, offline location. Do not photograph or store the phrase on any internet-connected device. Ledger staff will never ask for your recovery phrase; any request for it is a red flag.

4. Install apps and accounts

Use Ledger Live to install blockchain-specific apps (Bitcoin, Ethereum, etc.) onto your device. Once the app is installed, create an account in Ledger Live to display balances and transaction history; the actual keys remain on your device. When receiving funds, always verify the address shown in Ledger Live against the address displayed on your device screen, confirming both the full address and a checksum whenever possible.

5. Perform a verification transaction

Send a small test amount from an exchange or web wallet to your Ledger address and confirm the funds arrive. This helps you validate addressing and ensures that your setup works end-to-end before moving larger amounts. After verifying, you can send larger transfers with confidence.

6. Maintenance and firmware updates

Periodically check Ledger Live for firmware updates. Ledger may release updates that include security fixes, new features, or support for new coins. Update only through Ledger Live or the official instructions. During updates, the device may prompt for confirmations; follow on-screen guidance carefully.

Annotated technical reference

Technical readers may prefer annotations that explain the internal mechanisms and best practices for integrations. Below are important technical notes and references.

Key storage and the secure element

Ledger devices contain a secure element (SE), a tamper-resistant chip that stores private keys and performs cryptographic operations. The SE isolates private key material from the host environment (computer or phone), ensuring signatures are produced on the device and cannot be extracted by software alone.

Device attestation and authenticity

Ledger devices include attestation certificates that allow compatible software or services to verify a genuine Ledger product. Attestation helps integrations detect counterfeit devices and prevents certain classes of supply chain attacks when implemented correctly.

Interacting via Ledger Live and third-party apps

Ledger Live interacts with the device via USB or Bluetooth (for supported models). Third-party wallets can use the device through established protocols (like WebHID, WebUSB, or Bluetooth) and ensure the on-device confirmations prevent address manipulation. When using third-party apps, verify the app's provenance and permissions, and prefer widely-reviewed clients with active community support.

Compact checklist for teams

If you manage multiple devices (for an organization or team), use this compact checklist for provisioning and policy enforcement.

  1. Record device serial numbers and associate them with owners.
  2. Use centralized inventory and access policies to control who can use which device.
  3. Adopt multi-signature architectures when multiple approvals are required for large transfers.
  4. Securely store backup recovery phrases in geographically separated locations using safe deposit boxes or encrypted hardware vaults.
  5. Document recovery procedures and perform periodic drills to ensure operational readiness.

Different presentation formats

This site offers the same core information in multiple presentation formats to meet different learning styles and operational needs:

  • Compact Quickstart: Short, action-oriented steps for experienced users.
  • Narrative Walkthrough: Full explanations that build mental models for newcomers.
  • Annotated Technical Reference: Deeper details for auditors and integrators.
  • FAQ & Troubleshooting: Rapid answers to common problems and safety checks.

FAQ & Troubleshooting

Q: I lost my Ledger device. What should I do?

A: If you have your recovery phrase, you can restore access on a new Ledger or compatible hardware wallet. If you do not have the recovery phrase, funds cannot be recovered. For accounts where additional protections exist (multi-sig, custodial recovery), follow organizational procedures. Revoke any linked sessions and notify relevant services to watch for suspicious activity.

Q: Someone is asking for my recovery phrase — is this normal?

A: No. Ledger staff and legitimate support will never ask for your recovery phrase. If anyone requests it, treat it as a phishing attempt. Do not enter your phrase into websites, apps, or chat.

Q: How do I verify a receiving address?

A: Always verify the full receiving address on your Ledger device's screen before sending funds. The device displays the address as it will be used on-chain; software wallets may show modified addresses due to malware. Confirm the address characters and checksum if visible.

Safety checklist

A short set of safety rules to reduce risk while managing private keys and devices.

  1. Never share your recovery phrase with anyone.
  2. Use a PIN code on your device and enable passphrase features if you require an additional layer.
  3. Prefer hardware storage for large holdings and keep only smaller amounts on hot wallets for frequent transactions.
  4. Keep firmware up to date and verify updates through Ledger Live.
  5. Use multi-signature setups for organizational controls and high-value stores.

Examples & Use Cases

Ledger devices support a range of use cases for individuals and organizations. Below are practical examples and recommended practices for each.

Personal savings

For long-term holdings, keep the majority of funds in hardware wallets and store the recovery phrase in secure offline locations. Consider splitting the recovery phrase between trusted vaults or using specialized metal backup plates designed to resist fire and water damage.

Active trading

If you trade frequently, keep an operational hot wallet for small balances while holding the majority in cold storage. Use exchanges and custodial services with caution, and prefer withdrawing to your Ledger when not actively trading.

Organizational treasury

Organizations should consider multi-signature architectures that distribute signing authority across multiple devices or individuals. Ledger devices can be part of a multi-sig scheme using software wallets that support co-signer hardware devices.

Developer & Integration notes

Developers building integrations with Ledger devices should adhere to security best practices. These notes are for integrators and assume familiarity with standard crypto tooling.

APIs and protocols

Interfacing with devices generally uses established transport layers (WebUSB, WebHID, Bluetooth) and standardized message formats. Ensure your integration requests explicit user confirmations for sensitive actions and validate attestation data when available.

Testing and QA

Use test networks for development and encourage users to verify addresses and transaction details on-device. Keep your integration's dependencies up-to-date and monitor for security advisories related to the transport stacks you rely on.

Visual walkthroughs

For visual learners, we include diagrams and annotated screenshots (where appropriate) that show key steps like connecting the device, confirming an address, and checking transaction details on-screen.

  1. Connect device to computer or pair via Bluetooth where supported.
  2. Open Ledger Live and navigate to Manager to install apps.
  3. Open the appropriate app (e.g., Bitcoin) on your device to view addresses and confirm transactions.

Printable checklist

A condensed checklist formatted for printing and keeping with your device box. Perfect for leaving in a safe alongside your recovery materials.

  • Verify package seals • _______
  • Device serial: _______
  • PIN chosen: _______ (do not store with recovery phrase)
  • Recovery phrase stored in: _______
  • Ledger Live installed on device(s): _______

Advanced topics

For users and teams that require advanced security postures, consider the following topics and how they apply to your threat model.

Passphrase (25th word) feature

Ledger devices support an optional passphrase that extends the recovery phrase to create multiple hidden wallets. This is a powerful feature but introduces additional operational complexity: losing the passphrase means losing access to funds in that hidden wallet. Use passphrases only if you understand the trade-offs and maintain secure backup procedures.

Multi-signature deployments

For high-value custody, multi-signature schemes distribute signing authority and reduce single-point-of-failure risk. Combine Ledger hardware devices with a software layer (e.g., a co-signer service or multisig wallet) that enforces quorum rules for transactions.

Air-gapped workflows

Some advanced users prefer air-gapped setups where the signing device is never connected directly to an internet-facing computer. Instead, transaction data is transported via QR codes or SD cards between online and offline machines. This reduces remote attack surface but increases operational complexity during signing and verification.

Support & resources

Official support channels and community resources can help troubleshoot issues. For anything related to device authenticity, lost recovery phrases, or firmware updates, prefer official ledger.com resources and contact channels listed on the site.

© 2025 Ledger — Official start guide. This page is informational; always verify details and downloads on ledger.com.
Privacy Terms