Hardware-grade security
Ledger devices isolate your private keys in a secure element for strong protection against theft and malware.
Set up your Ledger device in minutes. Follow secure steps to protect your recovery phrase, activate your device, and manage crypto with confidence.
Ledger devices isolate your private keys in a secure element for strong protection against theft and malware.
Clear on-device prompts and a step-by-step companion app guide you through initial setup and recovery.
Manage Bitcoin, Ethereum, NFTs and thousands of tokens across leading wallets and platforms.
Ledger is designed to give you full control over your digital assets. The Ledger setup process enforces security best practices from device initialization to long-term recovery management.
Confirm tamper-evident packaging and inspect the included recovery card. Only proceed if packaging is intact.
Follow on-device prompts to create a PIN and generate a secure recovery phrase — this never leaves the device.
Use Ledger Live to add accounts, install app support for assets, and perform verified transactions.
Your recovery phrase is the single most sensitive credential. Never share it. Ledger will never ask for your recovery phrase over email or chat.
Keep your recovery phrase offline, record it on the supplied card, and store it in a secure location away from prying eyes.
Apply firmware updates via Ledger Live, verify transaction details on-device, and be wary of phishing links that mimic official resources.
Ledger works with Ledger Live and many third-party wallets and platforms to manage Bitcoin, Ethereum, Solana, NFTs, DeFi positions, and thousands of ERC-20 tokens.
Ready to protect your crypto? Follow the guided onboarding in Ledger Live, verify your device authenticity, and save your recovery phrase securely.
If you suspect a security issue, contact verified support through the official support center only. Do not provide your recovery phrase to anyone.
Contact verified support