Ledger.com/Start

Ledger.com/Start: Your Official Starting Point

This is the secure, official gateway to begin setting up your new Ledger hardware wallet. Follow our detailed, step-by-step instructions to initialize your device and begin managing your crypto assets with peace of mind.

Ledger Nano Device and Ledger Live Software

The Importance of Starting at Ledger.com/Start

Your journey to digital asset security begins here. Navigating directly to ledger.com/start is the single most important action you can take to protect yourself from phishing attempts. Phishing websites are malicious duplicates designed to trick you into entering your recovery phrase or other sensitive information, leading to the loss of all your funds. By typing this URL directly into your browser's address bar, you are bypassing potentially dangerous search results and fraudulent links. This page serves as your verified entry point, guaranteeing that the software you download is authentic and your device setup follows the official, secure process. Ledger has built its reputation on ironclad security, and this page is a fundamental part of that commitment. We have put extensive measures in place to ensure this website is secure, but the first line of defense is always the user.

Your Step-by-Step Secure Setup Guide

Follow these instructions precisely to set up your Ledger hardware wallet. Do not trust any external guides or sources. Each step is designed to ensure maximum security for your digital assets.

1

Connect Your Ledger Device

Unbox your Ledger device. The Ledger Nano S Plus and Ledger Nano X will come with a USB-C cable for connection. Use this cable to physically connect your Ledger hardware wallet to your computer. The device screen should light up and display a welcome message, such as "Welcome to Ledger Nano X" or "Welcome to Ledger Nano S Plus." This physical connection is the start of a secure communication channel between your device and your computer, a channel that never exposes your private keys to the internet.

2

Install Ledger Live

Ledger Live is the official application for managing your hardware wallet. It is your main interface for interacting with your device, sending and receiving assets, and installing applications. You should only download Ledger Live from the official Ledger website, linked at the bottom of this page. Once downloaded, install and launch the application. Ledger Live will guide you through the remaining steps. It is designed to be a secure, user-friendly portal for your crypto assets. The software is constantly updated to support new coins and features while maintaining a focus on security.

3

Create Your PIN Code

Your PIN code is the first line of defense for your Ledger device. It is a 4- to 8-digit code that you will create and enter directly on your device. The PIN is required every time you connect your Ledger to your computer and want to access your funds. It is critical that you set a PIN and do not share it with anyone. The PIN protects your device from unauthorized access if it were to fall into the wrong hands. Remember, you should always enter the PIN using the physical buttons on your Ledger device. This process prevents keyloggers on your computer from capturing your PIN, a crucial security feature.

4

Write Down Your 24-Word Recovery Phrase (This is Crucial)

Your 24-word recovery phrase is the master key to your entire wallet. It is a series of 24 words that can be used to restore access to all your funds in case your Ledger device is lost, stolen, or damaged. Your Ledger device will generate this phrase for you, word by word, on its screen. You must meticulously write each word down, in the correct order, on the provided Recovery Sheet. Double-check your spelling and the sequence of the words.

**Why is this so important?** Your recovery phrase is the only backup of your private keys. If you lose your Ledger device and your recovery phrase, your funds are gone forever. Conversely, if someone else gets access to your recovery phrase, they can gain control of all your funds. This is why the security of your recovery phrase is paramount.

**Critical Safety Measures for Your Recovery Phrase:**

  • **Never** take a photo of your recovery phrase.
  • **Never** save it digitally (on your computer, in an email, on the cloud).
  • **Never** type it into a computer, smartphone, or any other device.
  • Store your recovery sheet in a secure, physical location, like a safe or a fireproof box.
  • Never tell anyone your recovery phrase. Ledger employees will never ask for it.

5

Confirm Your Recovery Phrase

Ledger Live will ask you to confirm a few words from your recovery phrase to ensure you have written it down correctly. This confirmation process is essential. It's the only chance to verify that you have a valid backup. Once you confirm, your device will be initialized and you can begin installing applications for the cryptocurrencies you want to manage.

Under the Hood: How Ledger Keeps Your Keys Safe

Ledger’s security is built on a simple, yet powerful foundation: the **Secure Element**. This is a chip similar to the one found in your passport or credit card, designed to resist sophisticated attacks. Your private keys are generated and stored inside this tamper-proof chip and will never leave it. Ledger Live, running on your computer, never has access to these keys.

Ledger Secure Element Diagram

The Secure Offline Transaction Process

When you want to send crypto, you create a transaction on Ledger Live. This unsigned transaction is sent to your physical Ledger device. On the device's screen, you can review all the details of the transaction to confirm them. This is a critical step, as it prevents so-called "man-in-the-middle" attacks where malware on your computer might try to alter the transaction details. Only after you physically confirm the transaction on your Ledger device using its buttons will the Secure Element sign the transaction with your private key. The signed transaction is then sent back to Ledger Live to be broadcasted to the blockchain. At no point are your private keys exposed to your computer or the internet.

Why Hardware Is Superior to Software

Software wallets (hot wallets) or browser extensions are always connected to the internet. This makes them vulnerable to a wide range of cyberattacks. Even the most secure software can be compromised by malware on your computer. A Ledger hardware wallet removes this risk entirely by keeping your private keys offline, making it virtually impossible for hackers to steal your funds without physical access to your device and your PIN code.

Frequently Asked Questions

My device says "Genuine Check." What does this mean?

The Genuine Check is a crucial step in the setup process. It's a cryptographic process performed by Ledger Live that verifies that your device is a genuine Ledger product and has not been tampered with or pre-configured by a malicious third party. If this check fails, you should immediately disconnect your device and contact Ledger Support. This feature provides an extra layer of security, ensuring your device's integrity before you initialize it.

What if I lose my 24-word recovery phrase?

The 24-word recovery phrase is your only backup. If you lose this phrase and your physical Ledger device, your funds are irretrievably lost. Ledger does not, and cannot, store your phrase. This is the core principle of self-custody. We strongly recommend storing it in a secure, physical location, away from your device.

Can I use my Ledger with a mobile device?

Yes, the Ledger Nano X can connect to your mobile device via Bluetooth, and both the Nano X and Nano S Plus can connect with a USB cable. Ledger Live has a mobile app available for both iOS and Android. The setup process is similar, ensuring the same level of security on the go.

Is Ledger Live safe to download from the website?

Yes. Downloading Ledger Live directly from the official website is the only recommended and safe method. The website uses secure connections (HTTPS), and Ledger Live files are cryptographically signed to ensure their integrity. When you launch the application, it verifies this signature to confirm it is the authentic, untampered software.

Ready to Secure Your Crypto?

Download the official Ledger Live application to begin the secure setup process with your new hardware wallet.