Why You Are Here
Congratulations on taking the most significant step in your cryptocurrency journey: Self-Custody. By purchasing a Ledger hardware wallet, you have decided to take full ownership of your digital assets. In the world of blockchain, the mantra "Not your keys, not your coins" is the golden rule. Centralized exchanges can fail, freeze accounts, or fall victim to hacks. A hardware wallet like Ledger ensures that your private keys—the cryptographic proof of ownership—never leave the secure element of your device.
This guide is designed to walk you through the Ledger.com/start process. Whether you have a Ledger Nano S Plus, a Ledger Nano X, or the new Ledger Stax, the fundamental principles of security remain the same. We will cover unboxing, software installation, device initialization, and the critical security practices that will keep your wealth safe for generations.
Bank-Grade Security
Your private keys are stored in a certified secure chip (CC EAL5+), the same technology used in passports and credit cards.
Ledger Live App
Manage thousands of tokens, visualize your portfolio, and access DeFi services directly from one powerful application.
Web3 Ready
Connect to decentralized applications (dApps) securely. Sign transactions with confidence knowing exactly what you are approving.
Step-by-Step Setup Guide
Follow these instructions carefully to initialize your device.
Download Ledger Live
The first step is to download the official companion app, Ledger Live. This software acts as the bridge between your secure device and the blockchain network.
- Navigate to the official download page.
- Select your operating system (Windows, Mac, or Linux).
- Install the application and launch it.
Initialize Your Device
Connect your Ledger device to your computer using the provided USB cable. The device will power on and display a welcome message.
Navigate through the on-screen instructions using the buttons on the device. You will be asked to choose between "Set up as new device" or "Restore from recovery phrase". For a new wallet, select Set up as new device.
Set Your PIN Code
Your PIN code is the first line of defense. It prevents unauthorized physical access to your device.
- Choose a PIN code between 4 and 8 digits.
- Avoid simple sequences like 1234 or 0000.
- Confirm the PIN code by entering it a second time.
The Recovery Phrase (Crucial Step)
This is the most important part of the setup. Your Ledger device will generate a 24-word recovery phrase. This phrase is the master key to your funds. If you lose your device, this phrase is the only way to restore access to your crypto.
Rules of the Recovery Phrase:
- Write it down on the provided recovery sheet.
- Double-check every spelling and word order.
- NEVER take a photo of it.
- NEVER type it into a computer or phone.
- NEVER share it with anyone, including support staff.
After writing it down, the device will ask you to verify the phrase to ensure you have recorded it correctly. This confirmation process is mandatory for your safety.
Genuine Check
Once your device is initialized, Ledger Live will perform a genuine check. This cryptographic verification ensures that your device is an authentic Ledger product and has not been tampered with.
Managing Your Crypto Assets
With your device set up, you are ready to manage your portfolio. Ledger Live allows you to install apps for different blockchains (like Bitcoin, Ethereum, Solana, etc.).
Installing Apps
Go to the "My Ledger" tab in Ledger Live. Here you can browse the catalog of supported cryptocurrencies. Installing an app on your device allows it to calculate private keys for that specific network. Don't worry about storage space; uninstalling an app does not delete your coins. Your coins live on the blockchain, not in the device.
Receiving Funds
To receive crypto, click "Receive" in Ledger Live. You will be asked to verify the address on your physical device. Always verify that the address shown on your computer screen matches the one on your Ledger device display. Malware on your computer could swap the address in your clipboard, but the device screen cannot be hacked remotely.
Frequently Asked Questions
Common questions about getting started.