Step-by-step: Using Ledger.com/start
Ledger.com/start is the canonical starting point recommended by Ledger devices during first-time boot. Manually enter the URL or use the QR code provided with your device to avoid typosquatting or phishing. Once on the start page, you’ll find platform installers for Ledger Live and clear, official instructions that ask you to confirm each step on your physical device.
1 — Verify the device box and unboxing
Ledger devices ship with tamper-evident packaging. Inspect the box for seals and signs of tampering. If you suspect the device was altered, contact the vendor immediately and do not use it.
2 — Install Ledger Live
Download Ledger Live from the official start page. Ledger Live is the desktop and mobile application that manages apps, updates firmware, and displays account balances. Avoid downloading from third-party sites or search results that may be malicious.
3 — Initialize on-device and write the recovery phrase
During setup the Ledger will create a recovery phrase (24 words) on the device itself. Write these words offline on the supplied card or a secure metal backup. Never take photos or store the recovery phrase digitally. This frase de recuperación is the only way to restore your wallet on another device.
4 — Firmware updates & app installation
Ledger Live will detect if firmware needs updating. Firmware updates are signed and require you to confirm on-device. Install only the official apps for the coins you plan to use via Ledger Live; do not install random third-party apps into your device.
5 — Optional passphrase / hidden wallets
Ledger supports an additional passphrase that creates a separate, hidden derivation (a different wallet). Passphrases increase security but add recovery complexity — if you forget the passphrase, funds in that derived wallet are lost. Use passphrases only if you understand the risks and recovery process.
Ledger Live: daily use & safety
Ledger Live is your control center. For everyday use, connect your Ledger, open Ledger Live, and unlock the device with your PIN. When sending transactions, Ledger Live constructs the transaction and your Ledger asks you to verify recipient address and amount on-device. This final on-device confirmation is the critical security step: attackers cannot sign transactions without it.
Security best practices
Threat model note: For most users, Ledger provides strong protection against remote attackers because private keys never leave the device. Your primary risks are physical theft, social engineering, phishing websites, and poor backup practices. Reduce risk by combining Ledger’s hardware security with operational discipline.
Troubleshooting
If Ledger Live does not detect your device, try a different cable or USB port, ensure your OS allows USB device access, update Ledger Live, or consult official support. If you forget your PIN after multiple failed attempts, the device may wipe — recover funds using your recovery phrase on a new Ledger or compatible wallet.
Final words — start safely
Always begin with the official root: Ledger.com/start. Follow on-device prompts, keep backups offline, and verify every firmware or app update. Empezar con seguridad es la mejor práctica — start safe, stay secure.