Welcome — secure your digital keys

This page walks you through setting up a hardware wallet — an essential device for safely storing private keys and protecting digital assets from online threats. The steps below assume you have an unopened device, a pen and a dedicated notebook for the recovery phrase, and a private, offline space to complete the process.

1

Unbox and verify hardware
Inspect the packaging for tamper-evidence seals and compare the physical device to the official images from the vendor. Only proceed if the packaging is intact and the device looks correct. Tamper evidence and vendor checks reduce the risk of supply-chain attacks.

2

Connect and initialize
Connect the device to your computer using the supplied cable. When prompted, choose 'Create new wallet' (or similar). The device will generate cryptographic keys inside a secure chip; these keys never leave the device. Follow on-device prompts — verifying the screen shows approval before you confirm any critical action.

3

Write down your recovery phrase
The device will show you a recovery phrase (12, 18, or 24 words). Write these words in order on the supplied card or a physical notebook. Do not take photos, do not store them digitally, and do not share the phrase. Consider engraving or metal backup solutions for long-term durability.

4

Confirm the recovery phrase
The wallet will ask you to confirm random words from your recovery phrase to validate that you copied them correctly. Only proceed if verification succeeds — otherwise repeat the process to ensure accuracy.

5

Set a PIN and optional passphrase
Choose a strong PIN to prevent unauthorized use. Some devices offer an optional passphrase (a BIP39 extension) that acts as an additional secret — treat it like a password and store it separately. Remember: losing the recovery phrase or passphrase can permanently lock access to your funds.

6

Test a small transaction
Before moving large amounts, send a small test transaction to and from your device's addresses. Confirm on-device that the address displayed by your companion app matches the device's screen before approving any transaction.

Why hardware wallets matter

A hardware wallet stores private keys in dedicated secure hardware and signs transactions internally. Because the private keys never leave the device, remote malware and phishing attacks cannot directly extract them. Combining a hardware wallet with best practices — trusted firmware updates, offline backups, and careful physical custody — yields a strong security posture.

  • Isolated private keys: Keys are generated and stored on the device's secure element.
  • Human verification: The device screen displays transaction details for you to verify before signing.
  • Recovery phrase: Enables wallet recovery if the device is lost — keep it offline and secure.
  • Firmware updates: Official signed firmware updates fix bugs and improve security; verify signatures where possible.

Common questions

What if I lose my recovery phrase?
+
If you lose the recovery phrase and have no other backups, you will not be able to recover the wallet. The recovery phrase is the sole method to recreate your keys. Consider multiple secure backups stored in physically different locations.
Can I use the device with multiple wallets?
+
Yes. Most hardware wallets support multiple accounts and can manage addresses for different cryptocurrencies. Use a trustworthy companion app or browser integration and always confirm addresses on the device screen.
Are metal backups necessary?
+
Metal backups (engraved or stamped) improve resilience against fire, water, and physical decay compared to paper. They are recommended for long-term storage of recovery words.

Practical safety checklist

Follow this short checklist to reduce everyday risks while using your hardware wallet.

  1. Buy directly from the vendor or an authorized reseller; avoid secondhand purchases.
  2. Keep firmware up to date but verify update authenticity.
  3. Never enter your recovery words into a computer or phone.
  4. Use a unique PIN; consider an additional passphrase if you understand its tradeoffs.
  5. Use small test transactions before large transfers.
  6. Store backups in at least two geographically separate, secure locations.