A comprehensive, step-by-step process for activating and securing your new hardware device.
Verification is paramount. Before proceeding, carefully inspect the device packaging. Look for any signs of tampering, resealing, or damage. The integrity seals must be unbroken and clearly visible. This step establishes the physical security baseline for your entire setup process.
Connect your device using the provided USB cable. The device screen should light up, displaying a welcome message or an initial setup prompt. **Do NOT use a third-party cable** for this critical initial connection. The device's firmware will begin a rudimentary diagnostic test to ensure all hardware components are functioning correctly and that no pre-installed malicious software is present. *This initial diagnostic takes approximately 30 seconds.*
Once connected, you must install the official companion application on your computer. Navigate only to the **official manufacturer website** to download the software. Verify the URL twice. Downloading from unofficial sources, even those that appear legitimate, is the most common vector for initial compromise. After download, run the installer and grant the necessary permissions. The application acts as the interface for firmware installation and wallet management.
The device comes with minimal factory firmware. The first major step is to install the latest, officially released firmware. The companion application will automatically detect your device and prompt you for the update. **Never install firmware from any source other than the official application.** The application downloads the firmware, verifies its signature cryptographically, and then initiates the transfer to your device.
During installation, the device screen may display a progress bar. **Do NOT disconnect the device during this process.** An interruption can brick the hardware, requiring a complex and time-consuming recovery. This installation process is crucial for enabling all advanced security features.
Upon successful firmware installation, you will be prompted to create a **Personal Identification Number (PIN)**. This PIN is your physical lock. It must be unique, not reused from any other service, and long. We recommend a PIN of **at least 6-8 digits**. The device employs a random number shuffle for the PIN input to prevent keyloggers from capturing your sequence.
When entering the PIN on your computer screen, the actual numbers are displayed on your device. You map the position on the computer screen to the position on the device. **This "screen-to-device" mapping is the core security feature of the PIN entry.**
The **Recovery Seed**, also known as the mnemonic phrase, is the master key to your digital assets. It is a sequence of 12, 18, or 24 randomly generated words (BIP39 standard). **This seed is generated *offline* by the device itself and is NEVER transmitted over the internet.** You must treat this phrase as the most critical piece of information you will ever possess.
The device will display the words one by one. You must meticulously transcribe them onto the provided **recovery sheets**. **DO NOT take a photo of the seed. DO NOT save it digitally.** Digital copies are susceptible to hacking, malware, and cloud leaks.
After transcribing all words, the device will initiate a verification process. It will ask you to confirm several words from the sequence (e.g., "What was word number 7?" and "What was word number 15?"). This is a final, crucial check to ensure your physical backup is accurate. **An incorrect or lost seed means permanent loss of funds if the device is damaged or stolen.**
With the firmware installed, the PIN set, and the Recovery Seed securely backed up, your device is now operational. You can now use the companion application to create your first wallet. **Always start with a small test transaction.** Send a minimal amount of cryptocurrency to the wallet address generated by your device, and then send it back out to a known exchange or wallet.
This **"Small Test Transaction"** is a critical final step. It confirms that the device is functioning correctly, that your recovery seed is accurate (as you must sign the transaction), and that you understand the entire process before committing significant funds.
Next, explore the advanced settings. Consider enabling a **Passphrase (25th word)** feature. This adds an *additional layer of security* beyond the 12/24-word seed and the PIN. A Passphrase creates a **hidden wallet** that is only accessible when the correct Passphrase is entered, making standard recovery seed attempts fruitless for an attacker.