Ledger — Start
Secure access • Official start page

Get started with Ledger

A plain-language, practical introduction to Ledger hardware devices and Ledger Live. Read the guide below to understand setup, best practices, and safe everyday habits. When you're ready, use the single login button at the bottom to begin the secure sign-in flow.

Using a hardware wallet is a foundational step toward taking full control of your crypto assets. Unlike software-only wallets that store keys on general-purpose devices, a hardware wallet holds your private keys inside a dedicated, tamper-resistant device. When you sign a transaction, the device performs the cryptographic signing internally and only exposes the signed transaction to the connected computer or phone. This architectural separation reduces the chance that malware or phishing can obtain your private keys, which is the single greatest risk to digital assets.

When you first set up a Ledger device, the process typically involves choosing a PIN and generating or restoring a recovery phrase. The recovery phrase — usually 12, 18, or 24 words — is the master backup that allows you to recreate your wallet if the device is lost or damaged. It is essential to write that phrase down on paper or store it with a durable offline backup solution and to never store the phrase in photos, text notes, or cloud storage. Treat the recovery phrase like cash: keep it secret and keep it offline.

Ledger Live is the official companion application available for desktop and mobile. It provides a friendly interface to manage accounts, check balances, send and receive funds, and apply official firmware updates. Ledger Live communicates with the device to request signatures but does not—and cannot—expose your private keys. Each important action must be confirmed on the device itself. Always verify transaction details (recipient address and amount) on the device screen before approving — this ensures that the transaction you see and the transaction you sign are the same.

Security is composed of a number of simple, repeatable habits. First, never share your recovery phrase with anyone or enter it into any website or app. Ledger support or any legitimate service will never ask for that phrase. Second, choose a PIN that is not guessable and do not write the PIN down alongside the recovery phrase. Third, only download Ledger Live and other official tools from the official Ledger website, and verify installers when possible. These practices reduce exposure and make it much harder for attackers to gain access to your funds.

Firmware and app updates are a normal part of keeping a hardware wallet secure and functional. Ledger periodically releases firmware updates that strengthen device security and add support for new chains or features. Always perform updates through Ledger Live and follow the prompts on the device screen. Avoid unofficial or third-party firmware and packages. If you see any prompts that look unexpected, consult official support channels before proceeding to avoid falling for falsified update attempts.

Phishing and social engineering are persistent threats. Malicious actors often create convincing fake pages and messages that impersonate well-known services. Verify the domain of any site you visit and prefer bookmarks for official resources. If you get an unsolicited message asking you to provide secrets or to urgently move funds, treat it as suspicious. Implement two-factor authentication where possible for email and exchange accounts, and do not reuse credentials across multiple services.

When interacting with decentralized applications (dApps) or DeFi platforms, exercise caution. Smart contract approvals can grant contracts permission to move tokens from your account. Review the specifics of any permission request, including the contract address and the scope of approval. Use a separate, limited account for experimentation and keep larger holdings in your hardware-secured wallet. Periodically review and revoke token approvals you no longer need to reduce attack surface.

Backup planning and long-term access are often overlooked but crucial. For small personal balances, a single well-protected physical backup may be sufficient. For larger portfolios or organizational custody, distribute backups across multiple secure locations and document recovery steps for trusted executors. Consider legal and financial advice when creating plans for inheritance or institutional recovery to ensure that access can be restored when needed and that the process remains secure.

Operational security extends to the whole ecosystem around your hardware device: protect your email, use unique passwords, enable two-factor authentication, and be cautious about browser extensions and untrusted software. If you suspect a device or recovery phrase has been compromised, transfer funds to a newly generated wallet as soon as possible. Faster response reduces the window of opportunity for attackers to drain assets.

These guidelines are intended as a clear, practical foundation to help you get started with Ledger securely. They are not exhaustive, but they cover the most important, real-world practices that protect most users. If you need detailed walkthroughs, step-by-step tutorials and official support are available through Ledger's documentation. When you are prepared to access your account, click the login button below to begin the secure sign-in process — the single button on this page keeps your next step simple and deliberate.

Account access
Click the button below to begin the secure login flow. Ledger Live and the device will prompt you to connect your hardware, enter your PIN, and confirm any required actions on-device.
Ledger Start • Keep your recovery phrase offline • Never share your recovery phrase with anyone.