Why Ledger? A short primer
Ledger hardware wallets are designed to keep your private keys offline in a purpose-built secure element. That means even if your computer or phone is compromised, your keys cannot be extracted. The Getting Started Hub explains the security model in plain language and helps you adopt practices that protect your long-term ownership of crypto and NFTs.
Ledger's ecosystem pairs compact, tamper-resistant hardware devices with Ledger Live — a modern app that shows balances, performs trades via vetted partners, supports staking, and displays NFTs — while requiring all critical approvals directly on the hardware device.
Download Ledger Live — verified and safe
Ledger Live is available for desktop (Windows, macOS, Linux) and mobile (iOS, Android). The hub provides direct links to the official stores and installers. For high assurance users, the page also exposes checksums and signature verification instructions so you can confirm the installer hasn't been tampered with.
Checklist before installing
- Confirm the URL is ledger.com/start and not a third-party mirror.
- Check the app publisher on mobile stores (Ledger).
- For desktop, optionally verify checksum/signatures following the hub's guide.
Step-by-step setup & first run
- Install Ledger Live and open the app.
- Select "Set up new device" or "Restore device" depending on your situation.
- Follow firmware and onboarding prompts. Create a PIN on the device — never on your computer.
- Write your recovery phrase exactly as displayed and store it offline in multiple secure places.
- Add accounts inside Ledger Live for the blockchains you use and test with a small transfer.
The hub provides printable backup cards, videos for each step, and recommendations for durable metal backup solutions if you want maximum resilience.
Security & recovery best practices
Never shareLedger or support will never ask for your recovery phrase. Treat it like a physical key.
Verify on-deviceAlways confirm addresses and amounts directly on your device screen before approving.
Verify downloadsUse checksums/signatures when high assurance is required.
Use multiple backupsStore recovery copies in at least two secure physical locations.
The hub also explains passphrase wallets, hidden accounts, and how to recover if a device is lost or damaged — all without exposing your seed phrase to online risk.
Help & community resources
The Getting Started Hub links to official support articles, status pages, community forums, step-by-step videos, and contact channels. If you suspect fraud, a compromised installer, or a lost seed, follow the emergency steps on the hub and contact official support through verified channels only.
Pro tip: subscribe to official channels to receive firmware and security announcements; never trust unverified DMs or links promising "support" that ask for your seed or PIN.