Why use a hardware wallet?
Hardware wallets keep the private keys that control your cryptocurrency offline, away from internet threats such as phishing, malware, and remote hacks. Using a hardware device gives you full control of your funds: private keys never leave the device, and transactions must be signed in hardware.
What you'll need
- Your hardware device and original packaging.
- The recovery sheet that came with the device (or another secure backup method).
- A computer or mobile device with a compatible connection.
- A private location to perform setup without interruption.
Step 1 — Unbox and verify
Check for tamper-evident seals and confirm the device model and serial number match the documentation. If anything looks tampered with, stop and contact official support.
Step 2 — Power up and choose a PIN
Connect the device and follow on-screen prompts to select a PIN. Choose a PIN you can remember but that is difficult for others to guess. Do not store the PIN in plain text or photographs.
Step 3 — Generate and secure your recovery phrase
The device will display a 24-word recovery phrase. This phrase is the master backup that can recreate access to your accounts if the device is lost or damaged. Write the words on the provided recovery sheet and store it offline and securely. Avoid digital copies like photos, cloud backups, or notes.
[ write your 24-word recovery phrase here — keep offline and secure ]
Step 4 — Install the companion app
Download and install the official companion application from the manufacturer’s verified source. Use the app to add accounts and manage supported cryptocurrencies. Only install software from trusted sites or official app stores.
Step 5 — Add accounts and receive a test transaction
Add accounts for the currencies you use. Generate a receiving address and send a small test amount first — always verify addresses on both the app and the device before sending significant funds.
Security best practices
- Never share your 24-word recovery phrase — no support representative will ever ask for it.
- Keep firmware and apps updated via the official application.
- Be alert to phishing: verify URLs and avoid clicking unexpected links.
- Consider durable backups and an inheritance plan for long-term holdings.
- Use passphrase protection only after you fully understand recovery implications.
Recovering your wallet
If your device is lost or damaged, you can restore accounts with the recovery phrase on a compatible device. Perform recovery only in trusted environments and double-check each entered word for accuracy.
Advanced features
Devices often support extras like staking, swaps, and third-party integrations. Explore advanced tools only after mastering core security practices and favor official, reputable integrations.