Official Site® | Ledger.com/Start®
Welcome — set up your Ledger with confidence
This step-by-step guide walks you through downloading Ledger Live, installing official software, initializing your Ledger device, protecting your recovery phrase, and performing your first transactions. Follow official steps to keep your keys safe and maintain full ownership of your crypto.
Getting started — the essentials
Before you begin, dedicate 20–30 minutes to the initial setup. Keep your recovery phrase offline, choose secure PINs, and verify the software sources. This short investment dramatically reduces future risks.
1. Download Ledger Live
Always download Ledger Live from the official Ledger website. Ledger Live is available for Windows, macOS, Linux, iOS, and Android. The desktop version is recommended for privacy and full feature access.
- Visit ledger.com/start and choose your platform.
- Verify the download page URL and look for HTTPS and official domain indicators.
- Optionally verify checksums/signatures posted on the site if you require maximum assurance.
2. Install & open Ledger Live
Run the installer and follow prompts. During first launch, Ledger Live will request network access to fetch blockchain and market data. Grant access only if you are on a trusted network.
3. Initialize your device
Choose "Set up as new device" unless you are restoring from an existing recovery phrase. Ledger Live will guide you through firmware verification and device initialization. If the app warns about firmware authenticity, stop and consult support.
4. Create your PIN & record the recovery phrase
Pick a PIN that’s memorable but not guessable. Record your recovery phrase exactly as displayed — Ledger devices use a 24-word phrase by default. Store the phrase offline and consider durable backups (metal seed storage) for long-term resilience.
5. Add accounts & test
After setup, add accounts for coins you want to manage. Always send a small test amount before transferring large sums. Verify receiving addresses on your device screen; the device is the only trusted display for addresses.
6. Keep firmware & Ledger Live updated
Updates include important security fixes and new coin support. Only update firmware via Ledger Live and follow on-screen confirmations. Review release notes before applying updates.
Advanced tips
- Use a passphrase to create hidden wallets for plausible deniability; treat passphrases as separate secrets.
- Consider multiple backups in geographically separate secure locations to guard against fire or theft.
- For institutional or very large holdings, use multi-signature setups and hardware security modules (HSMs) where appropriate.
Ledger Live — what it does
Ledger Live is the official companion app that lets you manage assets, swap tokens, stake supported coins, and export transaction history. Ledger Live never has access to your private keys — all signing remains isolated on the device. It offers a consolidated portfolio view, customizable notifications, and straight-forward workflows for beginners and power users alike.
See balances, performance, and recent activity in one place.
Integrated partners allow swapping and buying crypto without exposing private keys.
Export CSVs and transaction histories for accounting and tax purposes.
FAQ & troubleshooting
- What if Ledger Live doesn't recognize my device?
- Check the USB cable and port, ensure the device is unlocked, confirm you approved any OS prompts, and that the device firmware is not outdated. On mobile, verify Bluetooth or OTG support depending on your device model.
- Can I recover my funds if my Ledger is lost?
- Yes — restore with your 24-word recovery phrase on a new Ledger or compatible wallet. If you used a passphrase, you must provide it to recover those hidden accounts.
- Is Ledger Live open source?
- Ledger publishes code and documentation for review; consult the official repositories for details and the current open-source status.
- How can I verify downloads?
- Check checksums and signatures posted on the official site, and ensure downloads come from ledger.com. For high-assurance workflows, verify binary signatures against published keys and use reproducible build instructions where available.