Unbox & Inspect
Check packaging integrity and follow manufacturer instructions. Never use a device with tamper evidence broken.
A step-by-step educational guide to set up and use a hardware wallet safely. Learn setup, recovery best practices, and how to avoid common pitfalls.
Follow these concise steps to set up and secure your hardware wallet.
Check packaging integrity and follow manufacturer instructions. Never use a device with tamper evidence broken.
Generate a new seed on-device and choose a strong PIN. Do not share the seed with anyone or take photos of it.
Write your recovery phrase on paper (or use a metal backup). Store it offline in multiple secure locations.
Designed to keep private keys isolated from internet-connected devices.
Private keys never leave the device — approvals happen on-device.
Based on open cryptographic standards for broad compatibility.
Transaction details are shown on the device for you to verify.
The recovery phrase is the single strongest secret. Treat it like cash — offline and private.
Download the official desktop or web companion from the device maker and verify hashes when possible.
Apply signed firmware updates from the vendor to ensure you have the latest protections.
A hardware wallet is a physical device that stores private keys offline and signs transactions without exposing the keys to connected computers.
Use your recovery phrase to restore keys on a compatible device or recovery tool. Keep recovery stored safely; without it your funds are unrecoverable.
Buying used hardware wallets is risky — prefer sealed new units from authorized sellers to avoid tampering risks.