A step-by-step onboarding to keep your digital assets safe — learn how to set up your hardware device, install apps, and recover your keys.
Security is simple when it’s built around strong hardware and clear guidance. This page helps you prepare, connect, and protect: from unboxing to your first transaction. Follow the steps below and keep your recovery phrase private and offline.
Private keys are generated and stored on-device in a secure element. Transactions are signed without exposing keys to your computer or phone.
A human-readable recovery phrase is all you need to restore your wallet — keep it offline and always encrypted with a backup strategy.
Use the companion desktop or mobile application to manage accounts, install cryptocurrency apps, and review transactions in a secure UI.
Digital ownership means responsibility. Unlike custodial platforms, hardware wallets give you full control of your keys and therefore full control of your funds. That authority comes with practices: verify human-readable transaction details on the device screen, keep backups physically separate, and avoid reusing single copies of your recovery data. Embracing these practices reduces your exposure to phishing, account takeovers, and centralized risk.