Start protecting your crypto with Ledger

Ledger combines simple setup, best-in-class hardware security and compatible apps so you own and control your digital assets — safely, privately and with confidence.

Hardware-first security

Isolate your keys

Private keys never leave the device — transactions are signed inside a secure element, not on your phone or computer.

Wide wallet support

Use the apps you love

Connect Ledger to popular wallets and dapps — manage Bitcoin, Ethereum, NFTs and thousands of tokens from one place.

Recovery made simple

Write down a recovery phrase

Generate a 24-word seed phrase during setup and keep it safe — it’s the only way to restore your assets if you lose your device.

Setup in 5 clear steps

1
Unbox and connect

Connect your Ledger device to a computer or phone using the included cable and open the Ledger Live app.

2
Create a PIN

Choose a PIN that only you know. The PIN protects access to the device itself — keep it secret and never enter it on an untrusted device.

3
Write your recovery phrase

Ledger generates a 24-word seed phrase. Write it down in order on the provided card — never store it digitally or online.

4
Install apps

Use Ledger Live to install the wallets or apps you need for Bitcoin, Ethereum, Solana, NFTs or other blockchains.

5
Transact securely

Confirm transaction details on your Ledger device. The final approval on-device ensures transactions aren’t tampered with by compromised software.

Frequently asked questions

What happens if I lose my Ledger?

If your Ledger is lost or damaged, you can recover your crypto with your recovery phrase on a new Ledger or any compatible wallet that supports the same standard.

Can Ledger ever access my funds?

No. Ledger does not hold or control your private keys. You remain the only owner of your funds — Ledger provides the secure hardware to store and sign transactions.

Is my recovery phrase compatible with other wallets?

Yes. Ledger uses BIP39/BIP44 standards which are widely compatible. Be careful when restoring to third-party devices — follow their security guidance.