Overview
Hardware wallets keep your cryptocurrency keys offline, greatly reducing the risk of theft from malware or phishing. This page explains the typical setup flow you'll encounter when starting a Ledger device: what to look for in the box, how to create a PIN, recording and verifying your recovery phrase, installing Ledger Live, and following security best practices. The guidance here is intentionally practical and concise so you can complete the process without confusion.