Official Ledger Wallet™ Download Page

(Official) | Start Using Your
Ledger® Wallet

Your all-in-one crypto wallet app to confidently and conveniently manage all your digital assets from one secure place while keeping your private keys offline, far from hackers' reach.

Trusted by over 8 million customers

TECHNICAL SPECIFICATIONS

Hardware wallet security features and capabilities

01
SEC-001

Secure Element Chip

Military-grade security with CC EAL5+ certified secure element processor that stores your private keys in an isolated, tamper-proof environment.

LEARN MORE
02
SEC-002

Offline Key Storage

Your private keys never leave the device and remain completely offline, protected from remote hacking attempts and malware infections.

LEARN MORE
03
FNC-001

Multi-Currency Support

Manage Bitcoin, Ethereum, and over 5,500 different cryptocurrencies and tokens all from a single unified interface.

LEARN MORE
04
SEC-003

PIN Protection

Multiple layers of PIN code protection with automatic device wipe after repeated failed authentication attempts.

LEARN MORE
05
BCK-001

Recovery Phrase Backup

24-word recovery phrase ensures you can always restore your assets even if your device is lost, stolen, or damaged.

LEARN MORE
06
TXN-001

Verified Transactions

Every transaction must be physically verified and approved on the device screen before execution, preventing unauthorized transfers.

LEARN MORE

ONBOARDING PROTOCOL

Step-by-step initialization sequence for your hardware wallet

01

Download & Install Ledger Live

Begin your journey by downloading the official Ledger Live application from the verified source. This companion software acts as your command center for managing crypto assets. Available for Windows, macOS, Linux, iOS, and Android, Ledger Live provides a unified interface to interact with your hardware wallet securely. The application undergoes regular security audits and is digitally signed to ensure authenticity. Always verify the download source matches the official Ledger domain to protect against phishing attempts.

02

Connect Your Ledger Device

Using the provided USB cable, establish a physical connection between your Ledger hardware wallet and your computer. For mobile users, Bluetooth connectivity is available on compatible devices. The secure element chip inside your Ledger will initialize and establish an encrypted communication channel. You'll see the Ledger logo appear on the device screen, indicating successful power-on. This physical connection ensures that all sensitive operations happen on the isolated hardware, never exposing your private keys to the internet-connected computer.

03

Initialize Device as New or Restore

You'll be presented with two options: setting up as a new device or restoring from an existing recovery phrase. For new users, select "Initialize as new device" to generate a fresh set of private keys. The device will use its true random number generator to create cryptographically secure keys. If you're migrating from another wallet or restoring after device loss, choose the restore option and prepare your 24-word recovery phrase. The choice you make here determines whether you're creating a new crypto identity or recovering an existing one.

04

Set Your PIN Code

Create a 4-8 digit PIN code that serves as your first line of defense against unauthorized access. Choose a PIN that's memorable to you but difficult for others to guess—avoid simple sequences like 1234 or birthdates. The device allows three incorrect attempts before adding increasing delays, and after multiple failures, it will reset completely to protect your assets. This PIN must be entered every time you connect the device, ensuring that even if someone physically obtains your hardware wallet, they cannot access your funds without this crucial security layer.

05

Write Down Recovery Phrase

Your device will now display 24 words one at a time—this is your recovery phrase, the master key to all your crypto assets. Write each word in exact order on the provided recovery sheet using a pen, never storing it digitally or photographing it. These words, derived from the BIP39 standard, mathematically encode your private keys. If your device is ever lost, stolen, or damaged, this phrase allows complete restoration of all your accounts on a replacement device. Treat this recovery phrase with extreme care: anyone with access to these 24 words can control your entire crypto portfolio. Store it in a secure, fireproof location, and consider using a metal backup solution for long-term preservation.

06

Verify Recovery Phrase

To ensure you've correctly recorded your recovery phrase, the device will prompt you to confirm specific words from your backup. This verification step catches any transcription errors before you begin storing assets. You'll be asked to select the correct word for positions chosen randomly—for example, "What is the 7th word?" or "What is the 18th word?" This crucial safety check ensures that if you ever need to restore your wallet, your recovery phrase will work correctly. Take your time and carefully verify each word requested.

07

Install Cryptocurrency Apps

Through Ledger Live's Manager interface, install apps for the specific cryptocurrencies you plan to store. Each blockchain requires its own dedicated app on the device due to the unique cryptographic algorithms and transaction formats. Bitcoin requires the Bitcoin app, Ethereum requires the Ethereum app, and so on. The device has limited storage (typically room for 3-10 apps depending on the model), but you can safely uninstall and reinstall apps as needed—your actual crypto holdings are tied to your recovery phrase, not the apps themselves. Apps are digitally signed by Ledger to ensure authenticity.

08

Add Accounts & Receive Crypto

With your preferred crypto apps installed, add accounts within Ledger Live for each currency. The software will generate unique receiving addresses derived from your private keys. These addresses are displayed on both the computer screen and the device screen—always verify they match before sharing with others. You can now safely receive cryptocurrency by sharing these addresses. Each transaction you receive will appear in Ledger Live after blockchain confirmation. Your private keys remain on the hardware device, never exposed to your computer or the internet, ensuring maximum security even when transacting regularly.

FREQUENTLY ASKED QUESTIONS

Common inquiries about hardware wallet security

What makes a hardware wallet more secure than software wallets?
Hardware wallets store your private keys in a dedicated secure element chip that is physically isolated from internet-connected devices. This means your keys never touch your computer or phone, making them immune to remote hacking, malware, and phishing attacks that commonly compromise software wallets.
What happens if I lose my Ledger device?
Your crypto assets are never actually stored "in" the device—they exist on the blockchain. Your Ledger simply stores the private keys needed to access them. If you lose your device, you can purchase a new one and restore full access using your 24-word recovery phrase. As long as you have your recovery phrase stored safely, your assets are always recoverable.
Can Ledger or anyone else access my funds?
No. Ledger has zero knowledge of your private keys or recovery phrase—these are generated randomly on your device and never leave it. Ledger cannot access, freeze, or recover your funds. You have complete sovereignty over your assets. This also means you bear full responsibility for securing your recovery phrase.
How do I know my device hasn't been tampered with?
Ledger devices include multiple anti-tampering mechanisms: the secure element chip will detect physical intrusion attempts, the device undergoes authenticity checks during setup, and the firmware is cryptographically verified. Only purchase from official sources (Ledger.com or authorized resellers) and always verify the device is sealed in original packaging.
Do I need to keep Ledger Live open to secure my crypto?
No. Your cryptocurrency is secured by your private keys stored in the hardware wallet itself, not by the Ledger Live software. Ledger Live is simply an interface to interact with your wallet. Your assets remain secure whether or not the app is running or even installed.
What if Ledger goes out of business?
Your assets would remain completely safe. Ledger hardware wallets use industry-standard BIP39 recovery phrases, which are compatible with many other wallet solutions. Your recovery phrase can be used to restore your accounts in numerous other wallets, ensuring you always retain access regardless of Ledger's business status.