Get started with the most trusted hardware wallet. Protect your crypto assets with military-grade security.
Follow these steps to secure your crypto
Plug in your device via USB
Install the official Ledger Live app
Create a new wallet or restore existing one
Get your Ledger device ready in minutes with our guided setup process
Plug your Ledger device into your computer using the USB cable provided in the box.
Install the official Ledger Live app on your computer or mobile device to manage your crypto.
Follow the on-screen instructions to set up your PIN and write down your recovery phrase.
Complete the setup process and start managing your crypto assets securely.
Select the perfect hardware wallet for your needs. Both devices offer the same level of security.
The most advanced hardware wallet with Bluetooth connectivity for mobile use.
Enhanced security with a larger screen and improved user experience.
| Feature | Nano X | Nano S Plus |
|---|---|---|
| Connectivity | USB-C + Bluetooth | USB-C |
| Apps | 100+ | 100+ |
| Mobile Support | ✓ | ✗ |
| Battery | ✓ | ✗ |
Already have a Ledger device? Start the setup process now.
Ledger hardware wallets provide the highest level of security for your digital assets. Here's how we keep your crypto safe.
Your private keys are stored in a secure chip, isolated from your computer and smartphone.
Access your device with a PIN code. After 3 wrong attempts, your device resets automatically.
24-word recovery phrase ensures you can always restore your wallet, even if you lose your device.
Review and approve every transaction directly on your device's screen before signing.
Join the community of users who trust Ledger to secure their digital assets
We're so confident in our security that we offer a bounty program. If you find a vulnerability, we'll reward you for helping us improve.
Everything you need to know about setting up and using your Ledger device
A Ledger hardware wallet is a physical device that stores your cryptocurrency private keys offline. It provides the highest level of security by keeping your keys isolated from internet-connected devices, protecting them from hackers and malware.
Still have questions? Our support team is here to help.