Ledger $\mathcal{E}$quinox $\mathcal{P}$ortal

Your definitive, secure guide to activating and mastering your Ledger device. Security starts here.

Step 1: Unbox & Initial Power-Up

Begin by carefully inspecting the packaging for any signs of tampering or previous opening. Your Ledger device should arrive sealed and pristine. Use only the provided USB cable to connect your device to your computer. The device will light up and display the welcome message, often "Welcome to Ledger," or similar instructional text. This step confirms the hardware is functional and ready for configuration. Never use a pre-configured device; if you see a seed phrase or PIN already set, **immediately halt setup** and contact official Ledger support, as it may be compromised. This is your first security checkpoint.

Once powered, use the physical buttons (or touch screen, depending on your model) to navigate the initial language selection. Confirming your preferred language ensures clear communication for all critical prompts throughout the rest of the setup process. Pay close attention to the device screen, as all fundamental security decisions will be made on the device itself, completely isolated from your computer or phone.

🔌

Device Isolation Principle

The core security of Ledger relies on **cryptographic isolation**. The private keys generated in the next steps never leave the secure chip. Your actions on the device (setting PIN, confirming transactions) are verified locally, making software-based attacks irrelevant to your private keys.

Step 2: Establish a Strong PIN Code

Your Personal Identification Number (PIN) is the local access lock for your Ledger device. You will use it every time you connect your device to access your applications and manage your funds. It must be a minimum of 4 digits and can be up to 8 digits long. **Crucially, never use the same PIN you use for your bank accounts, phones, or any other service.** Select a unique number combination that you can easily remember but would be impossible for someone else to guess. Inputting an incorrect PIN three times will completely reset the device, wiping the current configuration and requiring you to restore it using your 24-word Recovery Phrase.

The device will prompt you to enter the PIN twice for confirmation. Navigate the numbers using the physical buttons to scroll through and select each digit. The complexity of your PIN directly affects the local security of your device against unauthorized physical access. While the PIN doesn't protect the Recovery Phrase itself (which is the true key), it is the primary defense against casual theft or loss of the hardware. Treat it with the respect it deserves.

🔢

PIN Best Practice

A 6-8 digit PIN is strongly recommended. Avoid sequences (123456) or dates of birth. Memorize it and **never write it down** alongside your Recovery Phrase. They must be stored completely separately.

Step 3: Generate and Secure the 24-Word Recovery Phrase

The Single Most Important Step

Your device will now generate and display your **24-word Recovery Phrase** (also known as a seed phrase). This is the master backup key to your cryptocurrency assets. **Anyone who possesses this phrase owns your crypto.** The Ledger screen will display these 24 words one by one. You MUST transcribe these words onto the physical Recovery Sheets provided in the box. Do not take photos, type them into a computer, save them digitally, or speak them aloud near recording devices.

  • Use a pen, not a pencil.
  • Write clearly, double-checking the spelling of every single word.
  • Ensure the numbering (1 through 24) is correct.
  • Verify the order of the words; order is critical.
⚠️

The Digital Threat

The Recovery Phrase is the only component that requires **physical, offline storage**. Storing it on a cloud drive, email, password manager, or taking a screenshot is an immediate, catastrophic security failure. If it touches an internet-connected device, it is no longer secure. Your safety is contingent on the physical, fireproof, and waterproof storage of these 24 words.

Verification Procedure

After transcribing the phrase, your Ledger will prompt you to verify it by asking you to select words at specific positions (e.g., "Word 12," "Word 19"). This step is non-negotiable and guarantees you have accurately recorded the phrase. Only once this verification is complete is the device initialized. This entire process must be treated as a sacred ritual of digital security.

Step 4 & 5: Ledger Live & Genuine Check

Download and install the Ledger Live application **only from the official Ledger website**. Avoid third-party app stores or direct links from unverified emails. Ledger Live is the desktop or mobile interface you use to manage your device, install cryptocurrency apps, and view your balances. After installation, launch the application.

Connect your device (enter your PIN) and follow the prompts in Ledger Live to begin the connection process. Ledger Live will automatically perform a **Genuine Check**. This check cryptographically verifies that your hardware device is a genuine Ledger product and has not been compromised or tampered with at the factory level. This crucial digital handshake confirms the integrity of the secure element inside your device. **Never proceed if the Genuine Check fails.** This two-part verification (physical inspection + digital check) ensures maximum confidence in your hardware wallet's security foundation.

🛡️

Cryptographic Proof

The Genuine Check uses asymmetric cryptography to confirm the secure chip's signature with Ledger's servers, ensuring only authentic devices can pass. Your Recovery Phrase and private keys are never transmitted during this process.

Step 6 & 7: App Management & Security Finalization

**Step 6: Install Apps.** Use Ledger Live to install the specific cryptocurrency applications you need (e.g., Bitcoin, Ethereum, Solana). You install these apps to the Ledger device's internal storage. They are essential software interfaces that allow your device to generate addresses and sign transactions for that particular blockchain. The number of apps you can install depends on your model's capacity, but you can uninstall and reinstall them later without losing your funds, as your funds are stored on the blockchain, secured by the Recovery Phrase.

**Step 7: Store the Recovery Phrase Securely.** This final action transitions from digital setup to physical security. Place your written 24-word Recovery Phrase in a robust, secure location: a fireproof safe, a bank vault, or a geographically separate location from the device itself. Consider using a metal backup solution for permanence against water or fire damage. The separation of the device and the Recovery Phrase ensures that losing one does not immediately compromise the other, providing a crucial layer of redundancy against both theft and disaster.

🔒

Geographic Redundancy

For high-value accounts, split your recovery phrase storage into two halves and store them in different, protected physical locations. This minimizes the risk of a single catastrophic event (like a house fire) wiping out both your device and your backup.

Recovery Phrase: Storage and Protocols (Extended Security Guide)

The BIP39 24-word Recovery Phrase is a critical concept that users must fully understand. It is not just a password; it is the **deterministic input** used to mathematically derive all your private keys and, consequently, all your public addresses across various cryptocurrencies. This single list of words is the sole point of failure and the ultimate point of recovery. If you lose your Ledger device, you can use these 24 words in any other compatible hardware or software wallet to regain access to your funds. Conversely, if someone finds these 24 words, they can empty your accounts instantly, regardless of the physical location of your Ledger device.

🔥

Fire Risk Mitigation

Paper is flammable and susceptible to moisture. Investing in a high-quality metal plate (engraved or stamped) that can withstand temperatures over 2000°F is the highest standard of permanence for your phrase.

👤

Social Engineering Defense

No legitimate cryptocurrency company (including Ledger) will ever ask you for your Recovery Phrase via email, phone, or support chat. Any request is a malicious attempt to steal your funds. Never share it.

🕰️

Inheritance Planning

Consider a legal plan to securely pass on the location and method of accessing your Recovery Phrase to beneficiaries in case of incapacitation or death. These assets require explicit planning.

For advanced users, Ledger also supports the use of a **Passphrase** (also known as a 25th word). This is a custom word or string chosen by you, which creates an entirely separate, "hidden" set of accounts. This provides extreme deniability; if an attacker forces you to unlock your Ledger, you can provide the PIN for your main, low-value account, keeping your high-value account secured by the Passphrase completely hidden. The Passphrase must be memorized or secured with the highest level of caution, even greater than the 24 words, as it is non-recoverable if forgotten. This level of security is generally recommended only for those who fully grasp the concept of multi-layer key derivation. Master the 24 words first.

In summary, the journey from unboxing to full setup involves a progression from physical inspection to PIN creation, culminating in the secure generation and permanent, isolated storage of the 24-word Recovery Phrase. Every single step reinforces the core principle of self-custody: **you are your own bank, and your security is entirely your responsibility.** Adhering strictly to these protocols ensures your digital assets remain immune to external digital threats.