Unbox & verify
When you unbox, inspect tamper-evidence seals and packaging. Only use the device that came in sealed packaging. If seals are broken or packaging looks tampered with, contact the vendor immediately.
A friendly, secure way to initialize and protect your crypto assets — clear steps, helpful tips.
Hardware wallets keep your private keys offline. They minimize attack surface by signing transactions inside a dedicated device, protecting funds from phishing, malware, and cloud theft.
When you unbox, inspect tamper-evidence seals and packaging. Only use the device that came in sealed packaging. If seals are broken or packaging looks tampered with, contact the vendor immediately.
Power the device via USB or the recommended cable. Follow the on-device prompts to create a new wallet or recover from an existing recovery seed. Choose “Create new wallet” for a fresh start.
Pick a PIN you can remember but that is hard to guess. Many devices offer a “PIN matrix” for extra protection. Avoid writing the PIN down with the recovery seed. If someone obtains both, your funds are at risk.
The device will present a recovery phrase (12, 18, or 24 words). Write this down on paper or a metal plate immediately — do not save it digitally or photograph it. Store copies in secure, separate locations (e.g., safe, bank deposit box).
Confirm the recovery phrase when prompted. Connect your hardware wallet to an official wallet application (desktop or mobile). Always verify the app domain and extension before connecting, and avoid third-party apps you do not trust.
Before moving large funds, send a small test transaction to confirm everything is functioning. Verify address fingerprints on the device screen before confirming the transfer in the app.
Check official update channels for firmware updates. Install signed firmware only and follow vendor instructions. Firmware updates often include security fixes and new features.