Unbox and verify
Open the box on a clean surface. Verify the tamper-evidence seal is intact and the device shows the expected manufacturer logo. If anything seems tampered with, do not proceed — contact the vendor.
This guided setup will walk you step-by-step through unboxing, initializing, and securing your wallet. Follow each step carefully — security is the most important part.
Open the box on a clean surface. Verify the tamper-evidence seal is intact and the device shows the expected manufacturer logo. If anything seems tampered with, do not proceed — contact the vendor.
Connect the device to your computer or mobile via the supplied cable. Your device should display a welcome screen and an option to start setup. Only proceed using the official setup software or web portal provided by your wallet vendor.
Choose Create new to generate a fresh cryptographic key pair on the device. The private keys never leave the hardware — this is the core protection that keeps funds safe from remote theft.
The device will produce a recovery phrase — a sequence of words used to restore your wallet. Write these words on paper or a metal backup card. Do not store them digitally or photograph them. Keep backups in separate secure locations.
Choose a PIN to lock the device. A strong PIN prevents local theft from being used to extract funds. Optionally give your device a friendly label so you can identify it later in software interfaces.
Install the official companion app on your computer or phone and connect the device. Allow the app to pair with your device only when prompted. Review any software permissions and update firmware only when instructed by the official app.
When receiving funds, always verify the receiving address on your device screen before confirming in the app. When sending, confirm destination address and amount on the hardware device itself to mitigate malware risks on the host.
After setup, test your recovery phrase by performing a restore on a secondary device or emulator (without moving funds) to confirm your backup is correct. Only then consider your backup complete.