Step-by-step: Download, verify, and initialize
Start by visiting the official page at ledger.com/start. Choose the Ledger Live installer for your operating system or open the web app. If you download the installer binary, compute the SHA256 checksum locally (use platform tools such as shasum -a 256
on macOS/Linux or Get-FileHash -Algorithm SHA256
in PowerShell on Windows) and compare it to the value published by Ledger. When available, PGP signatures provide an additional layer of assurance: import the Ledger release key from a trusted source and verify the signature. This verification step protects you from supply-chain tampering and malicious mirrors.
After verification, run the installer. Ledger Live will guide you through the steps to create a new device or restore from an existing recovery phrase. During initialization the hardware will generate a recovery phrase (often 24 words) — write this phrase down exactly as shown and store it offline. Do not photograph, email, or store your recovery phrase on any online service. Set a strong pin on the device and, if applicable, configure any optional passphrase only if you understand the operational implications: passphrases act as an additional secret and losing one will prevent recovery of funds protected by it.
Ledger devices show important information on their display; always validate addresses and amounts on the device screen before approving. The combination of verified downloads, on-device confirmation, and offline seed storage forms a robust defense-in-depth model for protecting digital assets against remote attackers and compromised hosts.