!DOCTYPE html>
Securely initialize your device and install the official application.
To begin securing your cryptocurrencies, please follow the initial physical setup steps for your new Ledger hardware wallet.
The core concept behind Ledger's security model is **isolation**. The cryptographic secret, which is your 24-word Recovery Phrase, is processed and stored exclusively within the device's certified Secure Element (a chip designed to resist physical and digital attacks). This Secure Element is the "air-gap" that prevents your private keys from ever being exposed to your potentially compromised computer or the internet. When you initiate a transaction through the Ledger Live application (or this conceptual interface), the software only creates an *unsigned* data packet. This packet is sent to the Ledger device.
Upon receiving the unsigned transaction, the device's internal firmware verifies the details (recipient address, amount, fees) and displays them on its tiny screen. Only after you, the user, physically press the confirmation buttons on the device does the Secure Element use the internal private key to digitally **sign** the transaction. The signed transaction is then sent back to the computer for broadcast to the cryptocurrency network. Crucially, the private key **never leaves the device**. This robust, two-factor, physical confirmation system is the fundamental reason why hardware wallets are considered the safest way to store digital assets.
The 24-word Recovery Phrase (also known as the seed phrase or backup phrase) is not just a password; it is the **master private key** from which all your individual crypto accounts are mathematically derived. It is generated using a high-entropy source within the Ledger device itself.
**Importance:** If your Ledger device is lost, stolen, or destroyed, this 24-word phrase is the *only* way to restore access to your funds on a new hardware wallet. Ledger has no record of this phrase, and no one can retrieve it for you. This complete control over your backup is the essence of self-custody.
**Storage Best Practice:** The phrase must be written down **accurately** on the physical Recovery Sheets provided in the box. It should be stored in multiple, secure, fireproof, and geographically separate locations. Avoid digital storage (photos, cloud backups, notes apps, or email) at all costs, as any digital copy instantly converts your cold wallet into a hot wallet, vulnerable to hackers.
The Ledger Live application (which this interface conceptually represents) serves three main purposes: **Interface, Data Synchronization, and Firmware Management**. It acts as the visual bridge between your device and the blockchain. It synchronizes public blockchain data to display your balances and transaction history. It also manages the installation of cryptocurrency applications (e.g., Bitcoin App, Ethereum App) onto the device, which are required for transacting on different networks.
**Integrity Check:** Whenever you connect your device, Ledger Live performs a **Genuine Check**. This process verifies that the firmware on your Ledger is official and untampered with. The Ledger device holds a cryptographic secret known only to the Ledger servers, and the application challenges the device using this secret. If the device authenticates successfully, the application confirms the device's authenticity, protecting you from counterfeit hardware. This genuine check happens automatically every time you connect.
The application must be downloaded exclusively from the official Ledger website or within the dedicated app stores. Searching for "Ledger Live" on common search engines may lead to malicious advertisements directing you to phishing sites. **Always verify the source URL.**
Your PIN code (4 to 8 digits) is the **local protection** for your device. It prevents unauthorized access if the device falls into the wrong hands. The PIN is set during the initial physical setup on the device screen.
**Security Feature:** The device will permanently wipe its memory after **three consecutive incorrect PIN attempts**. This self-destruct mechanism ensures that a thief cannot endlessly attempt to brute-force the PIN. If the device is wiped, you simply restore your funds using your 24-word Recovery Phrase on a new device. Therefore, the PIN protects the physical device, and the Recovery Phrase protects the funds.
Never install applications onto your computer or smartphone that claim to be cryptocurrency tools unless they come from a **verified, official source**. Be wary of technical support scams—Ledger and other hardware wallet companies **will never** ask you for remote access to your computer or for your Recovery Phrase under any circumstances, including "upgrade assistance" or "security checks." If anyone requests your phrase, they are trying to steal your funds. Your security is solely dependent on the secrecy of your 24 words. Treat them as the most valuable asset you possess.