Secure access • Official start page

Get started with Ledger

A practical, plain-language introduction to hardware wallets and safe habits for managing crypto. Read the guide below; when you're ready, use the single Login button to begin the secure sign-in flow.

Hardware wallets are devices that protect your private keys by keeping them in a secure, isolated environment. Unlike software wallets that live on general-purpose devices, a hardware wallet performs signing operations on the device itself so your secret never leaves the secure element. This separation significantly reduces exposure to malware and remote attackers: even if your computer or phone is compromised, the attacker cannot extract your private keys from the hardware device.

When you unbox and set up a new Ledger device you will typically be asked to choose a PIN and either generate a new recovery phrase or restore from an existing one. The recovery phrase—commonly 12, 18, or 24 words—is the master backup of your wallet. If the device is lost, damaged, or stolen, the recovery phrase is the only reliable way to restore access to your funds. Because it is so powerful, treat the recovery phrase like a very valuable secret: write it down physically and keep it offline.

Avoid photographing, storing, or copying the recovery phrase into cloud storage or digital notes. Digital copies can be accessed remotely and are a target for attackers. Use durable physical backups such as paper stored in a safe, or metal backup plates designed to resist fire and water. If you distribute copies for redundancy, do so thoughtfully: splitting backups across multiple secure locations can protect against single-location loss but increases operational complexity and the risk of accidental disclosure.

Ledger Live is the official companion application for desktop and mobile that helps you manage accounts, check balances, send and receive assets, and apply official firmware updates. Ledger Live communicates with your hardware device to request transaction signatures, but it never has access to your private keys. For every critical operation, the device will show details on its built-in screen and require a physical confirmation—this is a key security boundary: verify amounts, recipient addresses, and any contract details on the device itself before approving.

Firmware updates are an essential part of maintaining device security and compatibility. Ledger periodically releases firmware updates that strengthen protections and add support for more assets. Only install updates through Ledger Live and follow on-device prompts carefully. Avoid third-party firmware or unofficial packages. If you receive an unexpected prompt or message asking you to update in a nonstandard way, consult official support resources before proceeding.

Phishing and social engineering attacks remain common. Attackers create realistic fake websites, malicious emails, and fake support pages to trick users into revealing their recovery phrases or installing malware. Remember that no legitimate support agent will ever ask for your recovery phrase. Always verify the URL of sites you visit, use bookmarks for official pages, and be cautious with links that arrive by email or instant message. Enable two-factor authentication (2FA) where available on critical accounts, and use unique passwords to reduce the damage if one credential is exposed.

When interacting with decentralized applications (dApps) or smart contracts, proceed with caution. Smart contracts often request token approvals that allow contracts to move funds; carefully read and understand the permissions you grant. For new or experimental platforms, use a separate account with a small amount of funds for testing before committing larger balances. Regularly review and revoke approvals that are no longer needed to limit exposure from compromised or malicious contracts.

Operational security covers more than the device. Protect recovery instructions, maintain secure backups, and ensure that trusted family members or executors know how to recover assets if necessary. For high-value holdings or organizational custody, consider multi-signature configurations that require multiple approvals to move funds. Multi-sig reduces the risk that a single compromised key results in total loss, and it can be combined with hardware security devices and institutional controls for stronger custody models.

Plan for inheritance and emergency recovery. A well-documented, legally sound plan ensures your heirs or trusted advisors can access funds if you become incapacitated. Use secure legal instruments or trusted custodial services as appropriate for your jurisdiction and family situation. Avoid leaving raw recovery phrases in informal documents; instead, use secure vaults, encrypted storage controlled by legal processes, or professional services that specialize in crypto estate planning.

For day-to-day convenience, many people keep a small 'spending' balance in a hot wallet for frequent transactions and reserve the majority of holdings in a hardware-secured wallet. This approach balances usability and security. Reassess your setup periodically as your holdings and needs change, and run recovery drills to confirm that the documented process works in practice. Being able to restore a wallet quickly and correctly is a practical test of your backup strategy.

If you suspect any compromise—unexpected prompts on your device, unknown transactions, or loss of confidence in the backup—move funds to a freshly generated wallet immediately. Create a new device or recovery phrase, transfer assets, and retire the potentially compromised keys. Quick, decisive action reduces the window of opportunity for attackers and helps preserve funds.

This page is intended as a clear, practical starting point to help you understand why a hardware wallet matters, how to set one up safely, and which habits reduce risk. It is not exhaustive; for step-by-step walkthroughs, troubleshooting, or device-specific details, consult official documentation and support channels. When you are ready to access your account and continue with the secure sign-in flow, use the single Login button below. The simple, focused interaction on this page is deliberate — a single, obvious next step to help you proceed with confidence.

Ledger Start • Keep your recovery phrase offline • Never share your recovery phrase with anyone.