Your Path to Absolute **Self-Custody** Starts Here

**Ledger® Onboarding™** Hub

The **Official Setup Hub** for your **Hardware Wallet Setup**. Understand the **Cryptographic Assurance** that protects your digital wealth.

Start **Hardware Wallet Setup**

Phase 1: Verifying the Environment and **Ledger Live** Gateway

Before commencing the **Hardware Wallet Setup**, you must establish a secure host environment. The entire **Ledger® Onboarding™** process is channeled through the **Ledger Live** application, the only official software interface designed to communicate securely with your device. Downloading it from the **Official Setup Hub** is the non-negotiable first step. We strongly advise using a known-good computer, ideally freshly scanned for malware, to mitigate the risk of host-side compromise, although the **Secure Element** provides defense against keyloggers during key entry. The **Ledger Live** application itself, being the cryptographic validation point, initiates the **Genuine Check** protocol immediately upon connection, ensuring the integrity of your new device before any sensitive data is processed.

1. Secure **Ledger Live** Download

Always download **Ledger Live** directly from the **Official Setup Hub**. Verifying the checksum or signature of the downloaded file (if provided) is an advanced measure to ensure **Cryptographic Assurance** against man-in-the-middle attacks on the download itself.

2. Host Environment Integrity

Your PC or Mac acts as the transaction serializer. While the **Secure Element** isolates keys, ensuring your local environment is clean minimizes risk during the **Ledger® Onboarding™**. Disable suspicious browser extensions and ensure firewalls are active.

3. Initial Device Connection

Connect the device using the provided official USB cable. The device screen should light up, indicating readiness. This physical connection begins the proprietary communication protocol required for the subsequent **Hardware Wallet Setup** steps within **Ledger Live**.

The Mandate of the **Ledger Live** Client

The **Ledger Live** client is more than an interface; it's a cryptographic validator. It performs checks on the **Device Firmware**, manages the application installs, and facilitates the two most crucial aspects of **Ledger® Onboarding™**: the **Recovery Phrase** generation and the **Genuine Check**. By constraining the entire **Hardware Wallet Setup** to this single, audited application, Ledger minimizes the attack surface. Trusting only the official path is paramount to achieving true **Self-Custody**. Any attempt to set up the device without **Ledger Live** means bypassing critical **Cryptographic Assurance** steps that verify the device's integrity.

---

Phase 2: The **Secure Element**, Entropy, and the **Recovery Phrase**

This is the moment of genesis for your digital assets. The private key generation is the most critical step in the entire **Hardware Wallet Setup**. It occurs solely within the certified, independent CC EAL5+ **Secure Element** chip, which contains a high-quality True Random Number Generator (TRNG) to produce the necessary entropy. The output of this entropy is then translated into the 24-word **Recovery Phrase** according to the BIP-39 standard. This phrase is the deterministic root from which all future public and private keys will be derived.

The Isolation of the **Secure Element**

The **Secure Element** is purpose-built to execute cryptographic operations in isolation. During **Ledger® Onboarding™**, it prevents the raw entropy data from leaving the chip. The 24 words of the **Recovery Phrase** are displayed only on the device's small, trusted screen. This means they are never sent to **Ledger Live**, never shown on your potentially compromised computer screen, and never broadcast over the internet. This physical and electronic isolation provides the foundation for genuine **Cryptographic Assurance** and is the technical definition of **Self-Custody**. The device is, by design, the single point of truth for your private keys.

Technical Note: The BIP-39 standard includes a checksum, ensuring that the 24th word verifies the integrity of the preceding 23 words, adding a layer of mathematical validation to your **Recovery Phrase**.

The Criticality of Physical Backup

You **must** meticulously record the **Recovery Phrase** on the provided physical sheets. Do not digitize this phrase: do not take a photo, do not store it in a password manager, and certainly do not type it into a computer. Storing the phrase digitally defeats the purpose of the **Hardware Wallet Setup** and compromises the **Secure Element's** security model entirely. This physical backup is the only way to recover access to your funds if the device is lost, damaged, or stolen. After recording, the device will prompt you to verify the phrase by manually entering several words back into the device using its buttons—a mandatory step in the **Ledger® Onboarding™** to ensure accuracy before funds are sent.

Setting the **PIN Code** and Local Security

Immediately following the **Recovery Phrase** generation, you will set your **PIN Code**. This 4-8 digit code is the local access control to the **Hardware Wallet Setup**. Critically, the **PIN Code** must be entered *only* on the device itself using the physical buttons. The random number pad layout shuffled on the **Ledger Live** screen is simply a visual guide; the key presses are registered by the device, making it impossible for keylogging software on your PC to steal your PIN. The **PIN Code** encrypts the private keys stored on the **Secure Element** chip. Three incorrect attempts will trigger a permanent wipe of the device, forcing you to use your **Recovery Phrase** on a new device. This self-destruct feature is an essential layer of **Cryptographic Assurance** against brute-force attacks on the device.

---

Phase 3: The **Genuine Check** and **Device Firmware** Verification

Once the **Recovery Phrase** and **PIN Code** are established, the **Ledger® Onboarding™** proceeds to system validation. The most important step here is the **Genuine Check**, which is automatically performed by **Ledger Live**. This is a challenge-response protocol: **Ledger Live** challenges the **Hardware Wallet** with a random input, and the **Secure Element** responds with a cryptographically signed answer using an internal, unextractable factory key. Ledger's servers verify this signature to confirm that the device is a legitimate product running genuine, untampered **Device Firmware**. This process is definitive proof that your device has not been tampered with or replaced during transit, providing absolute **Cryptographic Assurance**.

Understanding the **Genuine Check** Protocol

The **Genuine Check** confirms the presence of the authentic **Secure Element** and verified **Device Firmware**. If the check fails, **Ledger Live** will immediately warn you, halting the **Hardware Wallet Setup**. This is the only way to know with certainty that the device you hold is physically sound and ready for **Self-Custody**. Never proceed with **Ledger® Onboarding™** if the **Genuine Check** fails or is skipped.

Installing **Device Firmware** and Asset Applications

Following the **Genuine Check**, **Ledger Live** ensures your **Device Firmware** is the latest version. Firmware updates are mandatory for access to new features and security patches. Subsequently, you use the application manager to install individual cryptographic apps (e.g., Bitcoin, Ethereum) onto the device. These apps are code modules that allow the **Secure Element** to understand and sign specific blockchain transaction formats. They are audited, compartmentalized, and essential for managing your assets, completing the initial **Hardware Wallet Setup**.

Transitioning to **Self-Custody**: The Public Key Exchange

Once an asset app is installed, the **Ledger Live** client communicates with the **Secure Element** to request the derivation of your public keys and addresses, using the deterministic principles of the **Recovery Phrase** (BIP-32/44). These public keys are safe to share and are used by **Ledger Live** to monitor the blockchain for your balances. The core principle of **Cryptographic Assurance** is maintained because the private keys used to *spend* those assets remain locked within the **Secure Element**, invisible to **Ledger Live**. Your final step in this **Ledger® Onboarding™** process is sending a small, test amount to your newly generated, verified public address to confirm full **Self-Custody** functionality before transferring larger sums.

---

Conclusion: Sustaining **Cryptographic Assurance**

The **Ledger® Onboarding™** process is designed to be rigorous, ensuring you establish the highest possible level of **Security** from day one. By separating the key generation onto the **Secure Element**, physically safeguarding your **Recovery Phrase**, and verifying the device with the **Genuine Check**, you have successfully transitioned to true **Self-Custody**. Remember that your **Recovery Phrase** is your single, absolute backup. Treat it as your most valuable physical possession. Regular usage of **Ledger Live** ensures you receive timely **Device Firmware** updates, maintaining the **Cryptographic Assurance** required in the evolving landscape of digital finance.

Review Security FAQs
---

Technical FAQ: Deepening Your **Onboarding** Knowledge

The core value of the **Hardware Wallet Setup** is the isolation provided by the **Secure Element**. Generating the **Recovery Phrase** on a general-purpose computer (PC, Mac) exposes the critical entropy to the OS, where malware, keyloggers, or memory scraping could capture it. The **Secure Element**’s dedicated TRNG and isolated environment provide the necessary **Cryptographic Assurance** that the entropy is truly random and permanently sequestered, which is the entire basis of **Self-Custody**.

The **Genuine Check** confirms two vital facts for successful **Ledger® Onboarding™**: 1) The device contains an authentic **Secure Element** chip, verified by a factory key signature. 2) The currently running **Device Firmware** is authentic and signed by Ledger, meaning it has not been tampered with. This provides a chain of **Cryptographic Assurance** from the factory to your desktop, confirming the integrity of your **Hardware Wallet Setup**.

No, provided you have correctly secured your **Recovery Phrase**. The **PIN Code** is only the password to the physical device. Three incorrect entries will wipe the **Secure Element** clean, deleting the private keys stored on it. You can then use your 24-word **Recovery Phrase** to restore your **Self-Custody** access on any new or reset Ledger device, demonstrating the paramount importance of that physical backup during **Ledger® Onboarding™**.

This step is a crucial component of the **Cryptographic Assurance** and **Ledger® Onboarding™** process. It forces you to verify that you have correctly transcribed the words, reducing the risk of a fatal transcription error. If the verification fails, the phrase you wrote down is incorrect, and attempting to send funds to the device would be dangerous, as you would have no reliable way to perform **Self-Custody** recovery.

While the computer can be infected, the security model of the **Hardware Wallet Setup** protects the keys. Every **Device Firmware** package is cryptographically signed by Ledger. When the update is transferred via **Ledger Live**, the **Secure Element** on the device verifies this signature before execution. If a malicious program altered the update package, the signature would fail, and the device would reject the update, preserving your **Cryptographic Assurance** and **Self-Custody**.