Start: Secure your crypto with confidence

Step-by-step onboarding for your hardware wallet — set up, protect, and begin using your assets.

Welcome — a calm, secure start

This guide helps you set up a hardware wallet, create secure backups, connect to apps safely, and adopt best practices that reduce the risk of loss or theft.

Why a hardware wallet?

Hardware wallets keep your private keys offline and under your control. Compared with software-only storage, hardware devices make it far harder for remote attackers to access funds. Think of yours as a small, dedicated vault: it signs transactions only when you physically confirm them.

Before you begin

Find a quiet space. Have a pen and paper for your recovery phrase (do not photograph it). Keep your device and recovery seed away from public Wi-Fi and unknown USB cables. If possible, unbox your device yourself and inspect for tampering.

Step-by-step setup

1

Power on & initialize

Follow the on-device instructions to set up a new wallet. Choose a strong PIN that you can remember but isn't guessable. The PIN locks the device; multiple incorrect attempts will usually trigger a wipe for safety.

2

Write your recovery phrase

When the device displays a recovery phrase, write it down in the exact order on the provided card or a trusted notebook. This phrase is the only backup. Store copies separately in secure locations (e.g., a safe). Never share it.

3

Verify the seed

The device will ask you to confirm words from the recovery phrase. This ensures your backup is correct. If you make a mistake, start over and securely re-record the seed.

4

Install companion app

Use the official desktop or mobile companion to manage accounts and install apps for specific blockchains. Always download from the official source and verify integrity where possible.

5

Practice safety

Try a small transaction first to confirm everything works. Keep firmware updated, and never enter your recovery phrase into a computer or phone. If a site asks for your seed, it's a scam—refuse and disconnect.

Best practices & tips

Use a PIN and optionally a passphrase for an extra layer of protection. Distribute your recovery copies across trusted, geographically separate locations. Periodically review your backups and device firmware. Consider multi-signature setups for larger holdings.

Security checklist

  • Unbox device yourself; check tamper-evidence.
  • Record recovery phrase offline only.
  • Never enter seed into a computer or photograph it.
  • Verify companion app sources and firmware.
  • Use a small test transaction before larger transfers.