Unbox & verify
Inspect the packaging and device integrity. Only initialize a brand-new wallet from a trusted seller — never accept a device already initialized by someone else.
A friendly, secure walkthrough to set up your hardware wallet and protect your crypto.
Follow these steps to initialize your device, create a secure recovery phrase, and connect safely to your accounts. This guide focuses on best practices so you can access your crypto with confidence.
Inspect the packaging and device integrity. Only initialize a brand-new wallet from a trusted seller — never accept a device already initialized by someone else.
Use the official desktop or web app and connect the device via USB. Approve every on-device prompt and refuse any action you don't recognize.
Write down the recovery words exactly as shown. Keep this paper offline and stored securely; never photograph or store these words digitally.
Choose a device PIN or passphrase where supported. This adds another layer of protection if your device is lost or stolen.
Send a small amount to a new receiving address to confirm everything is functioning before transferring significant funds.
Hardware wallets isolate private keys on a dedicated device, which prevents remote attackers from extracting them. The recovery phrase is the single strongest secret that can restore access — treat it like a physical key to a safe. Combining a device PIN and safe storage practices dramatically reduces the risk of loss or theft.