Secure Device Setup

Support & FAQ

Welcome to Your Security Journey

This guide will walk you through the essential steps to initialize and secure your device. Follow each instruction carefully to ensure the safety of your assets.

The 4 Essential Setup Steps

Step 1: Power On and Initialize

Unbox your device and connect it to your computer using the provided USB cable. The screen should light up, prompting you to begin the setup process. Confirm that the packaging seals were intact before proceeding. A full inspection of the device is required to ensure no tampering occurred. This initial phase establishes the device's operational status and begins the critical firmware integrity check. Do not disconnect the device during this process.

Detailed process involves scrolling through a few introductory screens on the device itself. You will see a welcoming message and a brief overview of what a hardware wallet is designed to do. Focus on pressing the correct buttons to move forward. This foundational step is critical for verifying the device's authenticity.

Step 2: Create a New PIN Code

The first security measure is setting a **strong, unique PIN code** (4-8 digits). This code will be required every time you unlock your device. Use the physical buttons on your device to select the digits. **Never** use easily guessable combinations like birth dates, "1234," or repeating numbers. You will be asked to confirm the PIN twice. Keep the PIN private and do not write it down near your device. This step prevents unauthorized access to the device itself.

Spend a moment considering a memorable but complex sequence. The security of your physical device relies heavily on the strength of this PIN. If you fail to enter the correct PIN three times, the device will reset to factory settings, requiring the recovery phrase to restore it. This is a built-in safety feature designed to deter brute-force attacks.

Step 3: Write Down Your Recovery Phrase

This is the most critical step. Your device will generate a **24-word Secret Recovery Phrase**. This phrase is the master key to your assets. **Write it down** on the provided physical Recovery Sheet. **Never take a picture of it, type it on a computer, store it digitally, or share it with anyone.** The order of the words matters. Verify the written phrase multiple times as prompted by the device.

This process of physically transcribing the words is non-negotiable for security. Each word is part of a standardized list (BIP39). The device will ask you to confirm specific words from your list to ensure you have accurately recorded it. Failure to record this phrase correctly will result in permanent loss of access if your device is lost or damaged. Treat this phrase like gold.

Step 4: Install the Required Manager Software

On your computer, download and install the official Manager software from the authenticated source (link on the original website). Use this application to connect your device and update its firmware to the latest version. The manager is also where you will install the specific applications (like Bitcoin, Ethereum, etc.) you need to manage your assets.

Ensure your computer's operating system is up-to-date and that you are not running any suspicious background programs. The manager software acts as the secure interface between your computer's transaction requests and your hardware wallet's private keys. Always check the official website URL to prevent phishing attempts when downloading the software. Once installed, connect the device and follow the on-screen prompts for firmware installation.

🔐 Advanced Security and Best Practices

Beyond the initial setup, maintaining vigilance is key to long-term security. The following practices are highly recommended:

In-Depth Troubleshooting and Support

**Device not turning on?** Check the USB connection and try a different cable or port. Sometimes a direct connection to the motherboard port on a desktop PC provides more stable power than a USB hub. If issues persist, consult the official troubleshooting guides which cover common power and connection faults. Ensure your device is recognized by the computer's operating system before launching the Manager. The subtle difference between a charging state and a data transfer state is important for setup. (50 words)

**PIN entry failed?** Remember that the PIN is a physical process on the device screen. The Manager application on your computer has no knowledge of your PIN. If you have forgotten the PIN, you must intentionally enter it incorrectly three times to factory reset the device, and then use your 24-word recovery phrase to restore your assets. This is the only official recovery method. Do not attempt to guess the PIN endlessly as it will lock the device. The security feature is designed to prevent infinite attempts. (75 words)

**Recovery phrase verification failed?** If the device rejects your confirmation, you must restart the entire setup process. This failure indicates you have written down one or more words incorrectly, or in the wrong order. Do not proceed until the device confirms the phrase is correct. This step prevents you from creating a wallet with an invalid backup. The integrity of your backup is paramount, surpassing all other concerns. Start fresh and be meticulously careful. (80 words)

The ecosystem of hardware wallet security is built on the principle of **user responsibility**. You are the sole custodian of your private keys, which are secured by your 24-word phrase. The company and the hardware cannot recover your phrase or PIN for you. This deliberate design choice provides the highest level of security by eliminating a central point of failure. Educating yourself thoroughly on the concepts of public keys, private keys, and seed phrases is highly recommended for all users. Explore the detailed tutorials and video guides provided in the support center to deepen your understanding. Long-term security is an ongoing commitment to best practices. (100 words)

Furthermore, consider the use of a passphrase (25th word) as an advanced security feature once you are fully comfortable with the standard 24-word setup. The passphrase adds an extra layer of complexity, essentially creating a 'hidden' wallet that requires both the 24-word phrase and the specific passphrase to access. This is an optional feature for expert users who want maximum resilience against physical coercion or loss of the main recovery phrase. However, if the passphrase is lost, the funds associated with it are permanently inaccessible. Always weigh the benefits against the risks of added complexity. The base 24-word setup is sufficient for most users. (120 words)

Go to Official Support Center