Start your secure hardware wallet

A friendly, step-by-step quickstart to set up your device and protect your crypto — from unboxing to secure usage.

Step 1 — Unbox & inspect
Ensure tamper-evidence intact. Only use original packaging.
Step 2 — Initialize
Follow the on-device prompts. Create a new wallet, never restore an unknown seed.
Step 3 — Backup
Write down your recovery phrase on the provided card. Keep it offline and safe.
Step 4 — Use
Connect only to trusted software. Confirm addresses on the device every time.
Get started

1 — Before you begin: unboxing & inspection

When your hardware wallet arrives, treat it like a sealed security product. Check that tamper-evident seals are unbroken, that packaging contains the items listed in the included checklist (device, USB cable, recovery card, quickstart leaflet), and that there are no unexpected extras. If anything looks wrong, stop and contact the vendor or retailer — do not attempt to initialize a suspicious device.

2 — Initialize the device

Power the device and follow the on-screen prompts. Most modern hardware wallets guide you through creating a new wallet or restoring an existing one. Choose create new unless you are intentionally restoring a known recovery phrase. During initialization you will:

3 — Create a secure backup

Write the recovery phrase by hand on the recovery card provided — do not store it digitally (no photos, no text files). Keep multiple copies in separate secure locations if you prefer geographic redundancy. Consider storing one copy in a home safe and another in a safety deposit box or trusted custody location. If your wallet supports passphrase (an extra word you add to your seed), understand that losing both the seed and passphrase makes recovery impossible.

4 — Daily usage: sending & receiving

For sending funds, always confirm the destination address on the device screen — never rely solely on the computer's display. This prevents host malware from tricking you. For receiving, double-check the displayed receiving address on both the host software and the device. Use reputable wallet software that supports your device and verify that the software is up to date.

5 — Security best practices

6 — Troubleshooting & recovery

If you lose your device, recover with your recovery phrase on a compatible device or trusted recovery tool. If you suspect your backup was exposed, move funds to a new wallet with a newly generated seed as soon as possible. For hardware failure, contact the manufacturer for support — do not discard the device until recovery is complete.

7 — Privacy & operational habits

Use distinct accounts or addresses for different purposes if you want to keep transactions compartmentalized. Consider using coin control or privacy-focused wallet features when needed. Remember that blockchain transactions are public — operational security (OpSec) matters for privacy.

Final notes

Hardware wallets drastically reduce the risk of remote theft by keeping private keys offline. They are not magic — they require careful handling, disciplined backups, and attention to firmware and software origins. Treat them like a vault: a little care up front avoids large risks later.

If you followed the steps above, you're set for secure custody: unbox, initialize safely, back up offline, verify addresses on-device, and stay current with legitimate updates. Happy hodling — securely!