**Your Secure Digital Future Begins with Ledger.**
The global leader in securing digital assets. Protect your cryptocurrencies and valuable digital data with state-of-the-art, certified hardware technology.
Explore the Full Start GuideWhy Choose Ledger for Your Assets?
**Certified Security**
Our core technology is built around a secure element chip, providing the highest level of protection against digital and physical threats.
**Absolute Ownership**
With Ledger, you hold the keys. Complete control over your assets means true financial independence, always.
**Seamless Management**
Easily manage and grow over 5000+ digital currencies and assets through our intuitive management software.
**Ledger.com/Start: The Essential Guide to Setting Up Your Security**
Welcome to the forefront of digital asset security. This guide is your comprehensive walkthrough for initiating your journey with your new hardware security device. By the end of this article, you will have a deep understanding of the setup process, the critical security steps you must take, and how to begin managing your valuable holdings.
Establishing proper security from the very beginning is the single most important step in protecting your digital wealth. Let’s dive in.
**Phase 1: Initial Hardware Setup and Software Installation**
The journey starts with the physical device. Unbox your **Ledger** device and ensure you have all the components, including the device itself and the recovery sheet. **Always purchase directly from the official store to ensure authenticity.**
- **Connect the Device:** Use the provided cable to connect your hardware device to your computer or compatible mobile device. The screen should illuminate and display a welcome message.
- **Install the Companion Application:** The first major step is to download and install the official desktop or mobile companion application. This secure application is the gateway through which you will interact with your device and your digital assets. **Verify you are downloading the application only from the official source.**
- **Initial Configuration:** Follow the on-screen prompts. You will be asked if you want to set up a new device or restore an existing one. Select **"Set up as a new device."**
**Phase 2: Creating Your Personal Security Code (PIN)**
Your hardware device is protected by a self-selected **Personal Security Code (PIN)**. This is a crucial element of local security, ensuring that even if your device falls into the wrong hands, your assets remain inaccessible without this code.
The PIN must be between 4 and 8 digits. Choose a sequence that is easy for you to remember but impossible for others to guess. **Never use sequential numbers (1234) or common dates (birth years).** Use the physical buttons on your device to navigate and select the digits, and confirm your choice when prompted.
**Phase 3: The 24-Word Recovery Phrase (The Master Key)**
This is the most critical step in your entire security process. The **Recovery Phrase**—a sequence of 24 unique words—is the absolute master key to your digital assets. If your hardware device is lost, damaged, or stolen, this phrase is the only way to recover access to your funds on a new device.
You will be prompted to write down the 24 words displayed on your device's screen, in order, onto the provided physical recovery sheet.
- **Write it Down:** Use a pen and write clearly. **Do not take a photo, store it digitally, type it into a computer, or save it in any cloud service.** Digital storage is susceptible to hacking; the whole point of hardware security is to keep this key **offline**.
- **Verify the Phrase:** After writing it down, the device will ask you to verify a few random words from your list to confirm the integrity of your record. Complete this verification carefully.
- **Secure Storage:** Once confirmed, store your recovery sheet in a secure, private, and fireproof location, such as a safe deposit box or home safe. This phrase is the key to your vault.
A Note on Ownership: Anyone who possesses your 24-word recovery phrase has complete, uninhibited access to your digital assets. **Ledger will never ask you for this phrase.** Keep it secret, keep it safe.
**Phase 4: Installing Asset Management Modules**
With your security foundation established, you can now begin managing your assets. The companion application requires you to install specific "modules" (often referred to as 'apps') for each type of digital currency you wish to hold (e.g., a module for a leading blockchain, another for a different one).
- **Connect and Unlock:** Connect your Ledger and enter your PIN to unlock it.
- **Use the Manager Tab:** Navigate to the "Manager" section within the companion application.
- **Install Modules:** Search for the digital currency you want to manage and click "Install." The installation takes place directly on your hardware device's secure chip. **The module itself is lightweight; the vast majority of your device's memory is dedicated to security.**
**Phase 5: Funding and Daily Use**
Once the required modules are installed, you can begin receiving and sending assets securely.
- **Receive Assets:** Within the companion application, select the desired asset and click "Receive." The application will generate a receiving address. **Crucially, the hardware device will display this address on its physical screen.** You must manually compare the address displayed on the device with the one on your computer screen to ensure no malicious software has altered it. Only proceed once they match.
- **Send Assets:** When sending, your device acts as a final human confirmation layer. You will initiate the transaction in the companion app, but you must physically review the transaction details (recipient address, amount) on the device's screen and manually confirm the transaction by pressing the physical buttons. This process ensures that any malware on your computer cannot steal your assets.
Your **Ledger** is now fully operational. By following these steps, you have successfully migrated your digital assets from potentially vulnerable hot storage to the industry's highest standard of cold, offline security. This guide ensures your financial independence is protected by certified, robust, and user-controlled technology.