Why use a hardware wallet?
Hardware wallets (cold wallets) keep your private keys offline and under your direct control. Compared to online wallets or exchanges, hardware wallets dramatically reduce exposure to malware and remote server attacks. Use a hardware wallet to store long-term holdings, follow good backup practices, and treat your recovery seed as the single most important asset.
1. Unbox and verify the device
Only buy hardware wallets from trusted retailers or the manufacturer. Inspect packaging for tamper evidence, factory seals, or unusual tape. If anything seems suspicious, contact the vendor. Keep documentation and the original packaging until setup completes.
2. Initialize and create a PIN
Turn on the device and choose “Initialize wallet” if prompted. Create a secure PIN—longer is better. The PIN protects the device locally. Avoid using predictable PINs and never share it. If your device supports a passphrase (BIP-39 passphrase), treat it as optional advanced protection and document your approach.
3. Record the recovery seed securely
When the device generates a recovery seed (12, 18, or 24 words), write the words in order on the supplied card or a secure metal backup. Do not take photos, store seeds in cloud notes, or reveal them online. The seed can restore funds on a compatible device, so store it in multiple secure physical locations (safe, safe deposit box). Consider a tamper-resistant metal backup for fire and water resistance.
4. Install the official companion app
Install the vendor’s official application or the recommended wallet software from trusted sources. Always verify download links from the vendor’s documented website or reputable app stores. Keep your software updated; check release notes for security patches. When connecting the device, follow on-screen prompts and confirm addresses on the device display—not only on the computer screen.
5. Test with a small transaction
Before transferring large amounts, perform a small test send and receive. Confirm addresses on both the device screen and the host app. This confirms the entire setup chain and verifies that your backup seed can restore accounts if needed.
Best practices & ongoing security
- Never share your recovery seed or PIN with anyone.
- Use multi-factor protection on associated accounts (email, exchange).
- Keep firmware and companion app updated from official sources.
- Consider air-gapped workflows for very large holdings.
- Store backups in physically separate secure locations.
Following these practices helps protect crypto assets from phishing, malware, and physical loss.
Ready to go — summary
Set up your hardware wallet: verify the device, set a strong PIN, record the recovery seed offline, install the official app, and test with a small transaction. Treat the seed as your last resort for recovery. This guide helps you start confidently and securely.
Get Started