Quick start • ~15–25 minutes
What this guide covers
This guide explains how to unbox and verify a hardware wallet, install the official desktop application, initialize a new wallet,
back up your recovery seed, and perform a small test transaction. It emphasizes privacy, tamper checks, and best practices that reduce risk.
Follow each step carefully — most losses stem from skipped verification or unsafe backups.
1. Unbox & inspect
Start by checking the device packaging and any tamper-evident seals. Only proceed if seals are intact and the box appears factory-sealed.
If you see scratches, broken seals, or unexpected accessories, stop and contact vendor support before powering on the device.
2. Download the official desktop app
Always download wallet software from the vendor's official domain. Prefer typing the URL or using bookmarks over links in social posts.
If the vendor provides checksums or signature files, use them to verify the integrity of the downloaded installer before launching it.
3. Initialize on-device
Connect the device only to a trusted computer. Follow on-screen prompts to create a new wallet. Choose a PIN that balances memorability and strength.
Never store your PIN or seed in an insecure digital location. The device will generate a recovery seed phrase — write it down immediately on the supplied card or a dedicated backup tool.
4. Backup recovery seed securely
Record your recovery words exactly and store them offline in at least two secure locations. For long-term resilience, consider steel seed plates or a fireproof safe.
Avoid digital backups (photos, notes, cloud storage). If you use an additional passphrase (advanced feature), understand that it changes recovery semantics—document it safely.
5. Pair, update, and test
Pair the wallet with the desktop app. Confirm the device model and firmware version match vendor documentation. If updates are available, install them via the official app.
After setup, send a small test transaction to ensure you understand the signing and broadcast flow before moving larger funds.
Security best practice: Transaction verification should always be performed on the hardware device—review recipient address, amount, and fees on the device screen before confirming. If something looks off, cancel immediately.
6. Recover & verify periodically
Periodically check that your backups are accessible and legible. If you suspect your seed has been exposed, create a new wallet on a different device and transfer funds to the new wallet immediately.
Common questions
Q: Can I restore my wallet on another brand?
A: In many cases yes, if both devices use the same recovery standards (BIP39/BIP44, etc.). Check compatibility before relying on cross-brand restores.
Q: Is it safe to buy secondhand devices?
A: Buying new sealed devices is strongly preferred. Secondhand devices carry more risk; if used, perform a full reset and generate a fresh seed on a clean device before use.
By following these steps—verifying packaging, using official downloads, creating secure backups, and confirming transactions on-device—you greatly reduce your exposure to theft and loss.
Treat your recovery seed as the ultimate secret: protect it offline and share it with no one.