Overview
This guide covers setup, security, daily use and recovery for Ledger hardware wallets, with hands-on tips from several months of real testing. I explain why each step matters (not just what to press), link to standards like BIP‑39 and SLIP‑39, and point you to deeper how-to pages in this series (for example [setup-initial] and [firmware-updates]).
Who this is for: US-based crypto holders who want practical, security-first instructions for long-term self-custody. Who should look elsewhere: if you want custodial services, instant exchange custody, or a basic hot wallet for small, frequent trades, a hardware wallet may be more than you need.
(Yes, this is detailed. That’s the point.)
Unboxing & first setup (Step by step)
Step-by-step overview (short):
- Inspect packaging for tamper evidence and unexpected seals.
- Power the device and choose "Initialize as new device" (do not accept a pre-generated recovery phrase if offered).
- Write down the seed phrase exactly on the supplied card, then transfer to a metal backup plate ([metal-backup-plates]).
- Set a PIN and install the official desktop/mobile companion app to add accounts.
For a full, screen-by-screen walkthrough see [nano-s-unboxing-setup] and [setup-initial]. In my testing the setup took under 15 minutes when following each verification step. But take your time with the seed phrase — that’s the master key.
Sources: the seed generation method follows BIP‑39 (BIP-39).
Security architecture: secure element, air-gapped signing & supply-chain checks
Secure element: a dedicated secure chip stores private keys and performs signing without exposing private keys to the host system. The presence of a secure element reduces attack surface when the computer or phone is compromised (see NIST cryptographic module guidance: https://csrc.nist.gov/).
Air-gapped signing: signing a transaction while the signing device is not connected to the internet keeps private keys offline. PSBT (Partially Signed Bitcoin Transactions) makes this practical; see BIP‑174 for the format (BIP-174).
Supply-chain verification: buy from trusted sellers, verify device initialization screens, and confirm firmware authenticity before moving large balances. For device-specific supply-chain checks, see [supply-chain-verification] and [where-to-buy-safely].
Why this matters: if a package is tampered with or your host is compromised, these architectural layers give you meaningful protection.
Seed phrase, passphrase (25th word) and backups
Seed phrase basics: a 12- or 24-word seed phrase derives your private keys via BIP‑39. Longer phrases (24 words) increase entropy but both are recoverable using the same standard (BIP-39).
Passphrase ("25th word"): an optional, user-chosen string that acts as an additional input to the seed derivation. It creates a separate wallet that can’t be recovered without the exact passphrase. That is powerful, and risky. If you forget it, funds are lost. Consider whether you can manage this operational cost before enabling it (see [passphrase-25th-word]).
Shamir / SLIP‑39: Shamir Backup (SLIP‑39) splits a secret into shares and lets you require a threshold to reconstruct the seed. This can be useful for inheritance or geographic distribution. See the spec: SLIP-0039.
Best practice: store your primary seed on metal, use at least two geographically separated backups for long-term safety, and treat the seed phrase like a master key (don’t photograph it or store it digitally). For more options and product-agnostic techniques see [metal-backup-plates] and [seed-phrase].
Daily use: accounts, apps, firmware and verifying updates
Daily flow: open the companion app, connect the device, unlock with your PIN, and confirm transaction details on-device. Always read the transaction amount and destination on the device’s screen (on-device verification is the main defense against host malware).
Firmware updates: firmware patches address both security fixes and new coin support. Use the official companion app to update firmware and verify update authenticity (see [firmware-updates] and [verify-firmware]). I’ve seen firmware rollouts that fixed edge-case signature bugs; install updates after confirming they’re legitimately published.
Third-party wallets: you can use the hardware wallet with third-party software wallets for specific chains (see [third-party-wallets], [metamask-setup], [phantom-neon]). Those integrations are convenient but increase attack surface (the hardware device still signs; the host software builds transactions). Limit third-party permissions where possible.
Connectivity & model comparison
Which connection matters? USB-only is a smaller attack surface. Bluetooth adds convenience for phones but increases remote-attack vectors. NFC is rarely used for desktop workflows. More on connectivity: [connectivity-usb-bluetooth-nfc].
High-level model comparison (summary only — check full specs on the model pages):
| Model |
Screen |
Connectivity |
Target user |
Notes |
| Nano S |
Small screen |
USB-only |
Entry-level, cold storage |
Limited on-device app capacity. See [nano-s-guide]. |
| Nano S Plus |
Larger screen |
USB-only |
Frequent desktop users |
More app capacity than entry model. See [nano-s-plus-guide]. |
| Nano X |
Larger screen |
Bluetooth + USB |
Mobile users |
Bluetooth convenience for phone use. See [nano-x-guide]. |
| Stax |
Touch/retro screen |
USB (Bluetooth varies) |
Power users / mobile-friendly UX |
Different form factor and workflow. See [stax-guide]. |
Do not treat this table as a replacement for the dedicated model pages ([ledger-models], [model-compare]). I recommend matching features to your intended workflow.
Multisig and advanced setups
Why multisig? Adding multiple independent keys reduces single-point failures (e.g., one stolen device or one backup lost doesn’t give attackers access). For Bitcoin, multisig setups are widely supported (see: https://en.bitcoin.it/wiki/Multisignature).
Compatibility: hardware wallets commonly integrate with multisig-friendly wallets via PSBT or other standards — check [multisig-compatibility] and [multisig] for specific integrations and step-by-step instructions.
In my experience, multisig adds management overhead (co-signers, city distribution). But for large holdings it’s an often sensible trade.
Common mistakes, recovery scenarios & company risk
Common mistakes:
- Buying from unofficial sellers (increases supply-chain risk) — see [where-to-buy-safely].
- Photographing or typing your seed into cloud-synced devices.
- Enabling a passphrase without a reliable recovery plan.
Recovery scenarios: if the device breaks, recover using the seed phrase on a compatible wallet ([restore-recovery]). If you forget your PIN, a factory reset on the device erases keys; recovery requires your seed phrase ([forgot-pin]).
Company failure: if the company behind the device stops operating, standard BIP‑39 / BIP‑32 compatibility means you can recover to other compatible wallets — provided you control your seed phrase. For more on corporate risk, see [company-risk].
FAQ
Q: Can I recover my crypto if the device breaks?
A: Yes, if you have your seed phrase and a compatible wallet. Recoveries follow BIP‑39/BIP‑32 standards; see [backup-and-recovery] and [restore-recovery].
Q: What happens if the company goes bankrupt?
A: Your funds are not tied to the company if you control the seed phrase. The ecosystem supports recovery using compatible tools (assuming industry standards were followed). See [company-risk].
Q: Is Bluetooth safe for a hardware wallet?
A: Bluetooth adds convenience but a larger attack surface. If you need mobile convenience, enable Bluetooth only after weighing risk and follow connection hygiene (trusted phone, updated firmware). See [connectivity-usb-bluetooth-nfc].
Conclusion & next steps
Hardware wallets provide strong protection when set up correctly and paired with robust backup practices. I recommend reading the step-by-step [setup-initial], verifying firmware with [verify-firmware], and reviewing model differences on [model-compare] before you move large amounts into long-term storage.
Ready to proceed? Start at the Getting Started walkthrough: [getting-started].
(And remember: the seed phrase is the master key — protect it like you would a real safe deposit box.)