Ledger / Start

Your Journey to Digital Sovereignty Starts Here.

Welcome to the official Ledger onboarding portal. We are dedicated to providing the highest standard of security for your digital assets. Follow the essential steps below to set up your device, secure your recovery phrase, and begin your crypto journey with confidence. This process is non-custodial, meaning only you control your keys.

Begin Setup Now

The 5 Essential Onboarding Steps

1

Unbox and Verify Authenticity

Before initiating any setup, it is crucial to inspect your Ledger device and its packaging. Look for any signs of tampering, pre-opened seals, or damage. The integrity of the packaging ensures that the device has not been compromised during transit. You should never receive a Ledger device that has a pre-set PIN or a pre-written Recovery Phrase. If you encounter any of these red flags, cease the setup immediately and contact Ledger support. The device is designed to generate all cryptographic material locally upon its first use, confirming its state as a true hardware wallet. This first step is your primary line of defense against supply chain attacks, ensuring the hardware you hold is exactly the secure device Ledger intends for you. This meticulous inspection is a non-negotiable part of our security protocol and reinforces the principle that security starts with physical hardware integrity.

The verification process extends beyond simple visual checks. Once connected to Ledger Live, the application performs an automatic and cryptographically secured check on your device's firmware and authenticity. This process involves a challenge-response verification with Ledger's secure servers, confirming that your device is genuine and running official Ledger firmware. This technological layer of defense is automatic, but understanding its function is vital. It guarantees that the operating system running on your hardware is legitimate and hasn't been substituted with malicious software designed to siphon your private keys. Remember, your physical device is the root of trust, and confirming its authenticity is the foundational step for all subsequent security measures. Please allocate sufficient time for this verification to run its course completely before proceeding to the next steps of device initialization.

2

Set a Strong PIN Code

The PIN code acts as the immediate access gate to your device and, by extension, your private keys. Choose a PIN of 4 to 8 digits, selecting complexity over simplicity. Avoid common sequences, birth dates, or any number easily associated with you. The PIN is locally stored and never transmitted or shared. After three incorrect attempts, the Ledger device automatically wipes itself to prevent brute-force attacks, thereby ensuring physical theft does not compromise your assets. This auto-wipe feature is irreversible and intentional, forcing reliance on your 24-word Recovery Phrase for restoration. The strength of your PIN directly contributes to the security resilience of your device against unauthorized physical access. Think of your PIN as the lock on the vault, with the Recovery Phrase being the blueprint to rebuild the vault itself. A robust PIN code deters casual access and provides a critical time-delay function in the event of loss or theft, buying you time to move assets if necessary.

The process of setting the PIN is performed entirely on the device screen using its physical buttons. This vital isolation—never inputting the PIN on a connected computer—is a key security feature against software keyloggers or malware on your host machine. Confirm the PIN twice, meticulously double-checking each digit using the physical buttons to prevent typos. It is highly recommended to use a different PIN than any other password you use for digital services. This compartmentalization of access credentials prevents a single point of failure. Memorize your PIN; writing it down in a common place negates its purpose. If you must record it, do so using a secure, offline method completely separate from your Recovery Phrase storage. The PIN is your daily gatekeeper, and its security is paramount to the operational security of your Ledger wallet. Ensure your environment is private and secure while performing this critical step.

3

Secure Your 24-Word Recovery Phrase

This is the most critical step of the entire onboarding process. The 24-word Recovery Phrase (also known as a seed phrase) is the master key to your private keys and all associated assets. It is generated by your Ledger device and displayed once. You must transcribe it meticulously onto the provided Recovery Sheet. Write each word down clearly, numbered 1 through 24, and double-check every word immediately after transcription. The sequence and spelling of these words must be absolutely perfect. A single mistake in one word or its position will render your assets inaccessible if you ever need to restore your device. This phrase should **never** be digitally photographed, stored on a computer, or backed up to cloud services like Google Drive or Dropbox. Digital storage, even encrypted, is always susceptible to online attacks.

The absolute security of your assets depends solely on the physical, offline storage of this phrase. Once you have transcribed the words, the Ledger device will prompt you to verify the phrase by asking you to re-enter specific words in a specific sequence. Complete this on-device verification without fail. After verification, store the physical recovery sheet(s) in a secure, fireproof, waterproof location known only to you. Best practices involve splitting the phrase into two or three geographically separate secure locations (e.g., a home safe and a safety deposit box). This distributed storage protects against localized disaster (fire, flood) while maintaining full control. The 24-word phrase represents the mathematical key space, and keeping it secret is your ultimate defense against global theft. Treat this document like the equivalent value of all your digital wealth combined, because mathematically, that is what it represents in the context of cryptographic asset security and non-custodial ownership.

4

Install Ledger Live and Initial Apps

Ledger Live is the official application interface used to manage your Ledger device and assets. Download it only from the official Ledger website. Avoid third-party app stores or direct search results that might lead to phishing sites or modified software. Once installed, connect your device and follow the on-screen prompts to initialize the application. Ledger Live acts as a secure window into the blockchain, providing a user-friendly way to check balances, send, and receive assets. The application never holds your keys; all transaction signing occurs securely within the isolated chip of your Ledger device. Start by installing the necessary applications for the assets you plan to manage (e.g., Bitcoin, Ethereum). These applications are small, specialized pieces of code that enable the device's secure element to communicate with specific blockchains.

The process of installing apps is managed directly through Ledger Live's Manager section. Ensure your device is unlocked and connected. Due to the limited storage on the secure element, you may not be able to install every single coin application simultaneously. This is normal and by design, as only the required application needs to be installed to access and manage those assets. Uninstalling an app does not affect your funds; your private keys remain safe and intact, recoverable at any time using your 24-word Recovery Phrase. The app installation process is secured via cryptographic checks, ensuring that only official, verified Ledger applications are installed onto your hardware. Periodically check Ledger Live for firmware updates, which enhance security and add new features. Always apply firmware updates only when prompted by Ledger Live with your device physically connected and verified.

5

Conduct a Small Test Transaction

Before committing significant funds, it is mandatory to perform a full cycle of test transactions. This validates your entire setup—the device, the PIN, the Recovery Phrase backup, and the Ledger Live application connectivity. Start by sending a minimal amount of a low-fee cryptocurrency (like a small amount of Litecoin or a tiny amount of your preferred currency) from an exchange or hot wallet to your newly generated Ledger address. This confirms that your receive address is correct and operational. Wait for the transaction to confirm and appear in your Ledger Live portfolio. Verify the balance is correct. This is the 'Receive Test.' This step ensures you understand the fundamental process of locating your address and correctly executing a receiving transaction, which is often the first interaction users have with their new wallet.

Next, perform the 'Send Test.' Send that minimal amount of cryptocurrency back to the exchange or another wallet. This is arguably the most critical step, as it requires the secure signing of the transaction on your Ledger device using your PIN. This confirms that your device is functioning correctly and, crucially, that you can access and transact with your funds. Successfully completing the send test confirms that your hardware, firmware, PIN, and connection are all working together seamlessly as intended. Only after the asset has successfully left your Ledger address and confirmed on the blockchain should you consider the test successful. This entire verification process provides complete peace of mind before transferring larger sums, mitigating the risk of human error or a subtle, unnoticed setup flaw. Always triple-check the address you are sending to directly on the Ledger screen before confirming the transaction.

Our Security Philosophy: Trust through Transparency

Certified Secure Element (CC EAL5+)

The core of every Ledger device is a state-of-the-art Secure Element (SE) chip, the same type used for passports and credit cards. This chip is physically designed to resist highly advanced side-channel attacks (like fault injection or power analysis) and malware. It provides a robust, tamper-proof environment where your private keys are generated and stored. Critically, the SE ensures that your seed phrase and private keys never leave the device in a readable format. All cryptographic operations—signing transactions—are performed within this secure cocoon. This hardware isolation is the fundamental difference between a software wallet and a Ledger hardware wallet. The Secure Element acts as a miniature, self-contained computer specifically dedicated to cryptographic security, making it impossible for external malware, even on a compromised computer, to access the data it holds. This certification level is audited by independent third-party laboratories.

This commitment to using an independently certified chip, designated as Common Criteria EAL5+ (or equivalent), ensures a measurable and verified level of security assurance. Unlike general-purpose microcontrollers, the Secure Element is hardened against physical and digital extraction attempts, offering a level of defense required for truly sovereign digital asset management. This meticulous engineering decision is the cornerstone of Ledger's promise: that your keys remain offline, protected, and completely under your control, regardless of the security posture of your connected computer or mobile device. This physical barrier is your ultimate layer of digital protection in an increasingly connected world where software vulnerabilities are common.

The BOLOS Operating System

BOLOS (Blockchain Open Ledger Operating System) is a proprietary operating system developed specifically by Ledger to run on the Secure Element. Its design enforces strict isolation between different cryptocurrency applications and prevents any unauthorized code execution. BOLOS is responsible for ensuring that what you see on the device's small screen is exactly what is being signed—a concept known as 'What You See Is What You Sign' (WYSIWYS). This is crucial for verifying transaction details, such as the recipient address and the amount, preventing sophisticated malware from tricking you into approving a fraudulent transaction. The operating system's minimalism and specialization drastically reduce the attack surface compared to standard, multi-purpose operating systems. Every application must be cryptographically validated and installed through Ledger Live, guaranteeing authenticity.

BOLOS is also responsible for managing the PIN and the seed phrase verification process, ensuring these critical operations happen entirely on the device. By controlling the entire software stack that interacts with the private keys, Ledger eliminates reliance on third-party security patches or common OS vulnerabilities. This integrated hardware and software approach is called the Ledger architecture. The deliberate design choice to build a specialized OS ensures a closed loop of trust where the user's interaction with the keys is always mediated by the secure hardware and verified visual output. This architectural superiority is the reason Ledger remains the industry standard for cold storage security. Regular, verified updates to BOLOS ensure the system's ongoing resilience against new cryptographic threats and evolving attack vectors in the digital landscape.

True Non-Custodial Control

Using a Ledger device means you are practicing true non-custodial ownership. Unlike exchanges or centralized platforms that hold your private keys for you (making you a customer, not the owner), Ledger ensures that you, and only you, are in possession of the master key (your 24-word Recovery Phrase). Ledger, the company, has no access to your phrase, no way to recover it for you, and therefore, no ability to move your funds. This is the definition of digital sovereignty. This absolute control is a double-edged sword: it grants ultimate freedom but also carries ultimate responsibility. If you lose your Recovery Phrase, your assets are permanently inaccessible. This foundational principle removes counterparty risk—the risk that a third party will be hacked, regulated, or default, resulting in the loss of your funds.

The non-custodial model aligns perfectly with the ethos of decentralized finance and blockchain technology. Your private keys are generated in an isolated environment and are never exposed to the internet. They are secured by the physical device and backed up by the physical copy of your seed phrase. This architectural design makes the user the sole controller and beneficiary of their digital wealth. While centralized services offer convenience, they introduce a single point of failure and systemic risk. Ledger's approach is mathematically and architecturally proven to be the most secure way to hold large amounts of cryptocurrency, provided the user follows the strict security steps for handling the Recovery Phrase. Embrace the responsibility that comes with this powerful level of financial control and digital freedom.

Resources and Next Steps

Frequently Asked Questions (FAQ)

Q: What if I lose my Ledger device?
A: Your funds are safe. Your assets are stored on the blockchain, not on the device itself. You can restore access to your funds using your 24-word Recovery Phrase on any new Ledger device or any compatible hardware or software wallet. Losing the device only means losing the hardware interface; your keys, recoverable via the seed, are what matter. This highlights the importance of the Recovery Phrase.
Q: Can I use Ledger Live without the device?
A: Yes, you can view your balances and generate receive addresses without the device connected. However, to sign and broadcast any transaction (i.e., to send funds), the Ledger device must be connected, unlocked with your PIN, and the transaction details must be physically confirmed on the device screen. Viewing is separate from transacting.
Q: How often should I update my firmware?
A: You should apply firmware updates whenever they are made available through the official Ledger Live Manager. Updates often contain critical security patches, bug fixes, and new coin compatibility. Always ensure you have your 24-word Recovery Phrase accessible before starting any firmware update, as a precaution against rare interruptions during the update process.
Q: What is a Passphrase (25th Word) and should I use it?
A: The optional 25th word is an advanced security feature that acts as a second, separate seed phrase, creating a "hidden" wallet. It provides plausible deniability, as you can unlock a decoy wallet (the standard 24-word phrase) or the hidden wallet (24 words + passphrase). It is only recommended for highly experienced users, as losing the 25th word means permanent loss of access to the funds secured by it, with no recovery option.

Final Verification and Support

If you have successfully completed all 5 steps—Unboxing, PIN Setting, Recovery Phrase Backup, Ledger Live Setup, and the Test Transaction—you are fully secured. You have achieved digital sovereignty.

I Have Secured My Assets — Go to Dashboard

Need help? Visit our official Support Center or use the in-app chat function in Ledger Live.