Your Secure Start: Ledger.com/Start Guide
Initiate your journey into self-custody with confidence. This guide outlines the mandatory security steps and best practices from the moment you unbox your device.
Start Official Setup NowThe Essential 4-Step Onboarding Process
Download Ledger Live ONLY
Your first critical step is to download the genuine Ledger Live application. NEVER download from third-party app stores, torrents, or suspicious links. Always use the official link provided on the Ledger website to ensure the software's integrity.
Set PIN & Generate New SRP
Power on your device and choose 'Set up as new device.' Set a strong 4-to-8 digit PIN directly on the hardware screen. This PIN is your local access key. Crucially: Reject any device that arrives with a pre-set PIN or Secret Recovery Phrase.
Secure Your 24-Word Phrase
The device will display your Secret Recovery Phrase (SRP) word-by-word. This is your definitive, cryptographic backup. Write it down on the provided Recovery Sheet. Store it securely, offline, and away from any fire, water, or digital device. You must never type this phrase into any computer or phone.
Run the Genuine Check
After securing your SRP, connect your device to Ledger Live. The application will automatically perform a cryptographic Genuine Check with Ledger's secure server. This step validates that your device is an authentic Ledger product and has not been tampered with.
The Power of Cold Storage: Isolation & Trust
Understanding Self-Custody and Security
The core value proposition of a Ledger hardware wallet, the foundation of the Ledger.com/Start philosophy, is **absolute isolation**. Unlike hot wallets that keep your private keys on internet-connected devices (laptops, phones), the Ledger device uses a certified Secure Element (SE) chip to store your keys. This chip acts as a vault, ensuring your keys *never* leave the device. When you initiate a transaction via the Ledger Live interface, the transaction details are sent to the device, signed internally by your private key, and only the signed (completed) transaction is sent back to the internet. This process is key to preventing sophisticated malware, phishing, and remote hacks from compromising your assets.
The Trusted Display: Your Verification Checkpoint
A critical security practice outlined in the official setup is the verification of transaction details. Because your computer or phone screen can be compromised by malware (a "man-in-the-middle" attack), the only source of truth is the Ledger's internal, trusted display. Before pressing the physical buttons to approve any send, swap, or interaction, you must meticulously check the recipient address, the asset, and the amount on the small screen of your Ledger device. If Ledger Live shows a different address than your device, **do not sign it**. This active verification step is the user's final, essential defense layer.
Beyond the Basics: Advanced Security
After successful setup via Ledger.com/Start, you can explore advanced features like a 25th word Passphrase (known as a 'hidden wallet'). This optional feature adds another layer of plausible deniability, allowing you to secure a secondary, high-value wallet with a unique passphrase, separate from your main 24-word SRP. While this adds complexity, it demonstrates the depth of security available for experienced users looking to achieve maximum asset protection. Remember, all security features hinge on the absolute secrecy and offline storage of your original 24-word Secret Recovery Phrase.
Need Immediate Support?
If you are experiencing issues with the Ledger.com/Start process, especially with connection or device initialization, always consult the official support channels.
- Official Support Center →
- Ledger Academy for Learning →
Reminder: Ledger Support will **NEVER** ask for your 24 words.