Protect
Air-gapped private key storage: keep your keys offline and under your control.
Protect your digital assets with a secure hardware wallet — offline security, easy setup, and lifelong backup strategies.
Air-gapped private key storage: keep your keys offline and under your control.
Generate a secure wallet backup and recover assets if the device is lost or damaged.
True self-custody: you — not any exchange — control access to your funds.
Use a suite of compatible apps to send, receive and track assets securely.
Connect your hardware wallet and follow the on-screen prompts to install the latest firmware and software tools.
Choose "Create new wallet". The device will generate a secure backup phrase — write it down and store it offline.
Add a device PIN to prevent unauthorized use should the device be physically accessed.
Transfer assets from exchanges to your new secure addresses. Verify every transaction on-device before confirming.
Setting up a hardware wallet is one of the most important steps you can take to protect your cryptocurrency. This guide walks you through the essentials — including firmware installation, secure backup, device PINs, and best practices for long-term custody.
First, ensure you have a clean computer and a secure USB cable. Plug the device into your computer and open the official management application. The application will detect the device and usually prompt you to install firmware. Installing the latest firmware ensures the device has all security patches and compatibility updates. Never skip firmware updates that come from the device manufacturer’s official source.
After firmware is installed, the application will offer two main flows: create a new wallet or recover an existing one. Choose create a new wallet if this is your first device. The device will generate a wallet backup phrase (often called a "seed" or "wallet backup"). This backup phrase is the single most critical piece of information — it alone can recover access to your funds. Write the phrase down on a physical backup card, do not store it as plaintext on a computer or in cloud storage, and keep multiple copies in separate, secure locations (for example, a personal safe and a secure deposit box).
Next, set a device PIN. A PIN prevents someone with physical access from immediately reading the device. Pick a PIN that you can remember but is not easily guessable. Many devices include a mechanism that randomizes on-screen numeric entry to thwart keyloggers — follow the on-screen instructions and verify inputs directly on the device's screen whenever prompted.
With firmware, backup, and PIN in place, you’re ready to use the wallet with supported software to view balances, create receiving addresses, and make transactions. When creating transactions, always verify recipient addresses and amounts on the physical device screen before approving. This safeguards you against malware or browser tampering that attempts to replace destination addresses.
Consider advanced protections for larger holdings. Multi-signature (multi-sig) setups split authorization across multiple devices — requiring several signatures to move funds. This reduces single-point-of-failure risk. Cold-storage strategies (keeping most funds offline) and spending wallets (keeping a small amount in a hot wallet for daily use) are complementary approaches that help manage risk and convenience.
Regularly review and test your backups. A written recovery phrase is only useful if it is correct and can be used to restore a wallet. Consider performing a recovery test on a spare device — this confirms your backup process works without putting your main holdings at risk. Be discreet: avoid revealing details of your backups or device holdings in public or online profiles.
Finally, treat your hardware wallet as a long-term tool rather than a disposable gadget. Keep firmware updated from official sources, follow recommended vendor guidance, and be cautious of unsolicited technical support. If your device ever appears tampered with, do not use it — contact official support channels for guidance.
By following these steps — installing firmware, creating an offline backup, protecting the device with a PIN, verifying transactions on-device, and using multi-sig or cold-storage strategies when appropriate — you can take control of your crypto security and drastically reduce the risk of loss.
We offer guided sessions for first-time users or those migrating large holdings. Reach out to our team for hands-on help.
Request guidance