Unboxing & design
![Unboxing — placeholder]
Out of the box you get the device, a recovery card, a USB cable (type varies by model), and basic paperwork. The hardware feels solid in hand. Small screens limit long on-device confirmations but they do the job. In my testing, the tactile buttons made PIN entry reliable even with cold fingers.
If screen size matters to you, check specific model pages: Nano S review, Nano X review, and Stax review.
Setup: step by step
How to set up a typical device (high level):
- Power on the device and follow on-screen prompts.
- Choose "Set up as new device" or "Restore from recovery phrase" depending on your use case.
- Create a PIN on-device (remember it; this is required for use).
- Write the recovery phrase exactly as shown on the included card. Think of the seed phrase like the master key to a safe deposit box. Do not store it digitally.
- Confirm a few words when requested.
- Install companion app or manager on your desktop/phone and connect to the device (follow on-screen pairing and permission prompts).
For a model-specific walkthrough see our setup-ledger-step-by-step and setup-nano-s guides.
Security architecture
These devices rely on a few layered protections: secure element (a dedicated secure chip that stores private keys), on-device PIN entry, and on-screen transaction confirmation. Secure elements are designed to make key extraction extremely difficult even if an attacker has the device.
Air-gapped signing (using only QR codes or USB without exposing keys to a connected host) is possible with certain workflows. Does every user need true air-gapped operation? No. But if you want full offline signing for large holdings, plan it in advance.
Supply chain verification matters. Buy from authorized channels and verify device authenticity (see supply-chain-security-verification and buying-safely-and-supply-chain).
For an architecture-level primer, see our hardware-wallet-security-architecture page.
Seed phrase management
12 vs 24 words? BIP-39 defines both options, and each choice affects entropy — 24 words provide higher brute-force resistance. In my experience, most people will be safe with 24 words for long-term storage.
Metal backup plates survive fire and flood in ways paper can't. I’ve tested stamping and engraving plates; both work, but pick a method you can read decades later. For advanced backup schemes, SLIP-39 (Shamir-like backups) lets you split recovery into multiple shares. This is excellent for inheritance planning but adds operational complexity.
Think carefully about passphrases (the so-called 25th word). It can create a hidden wallet. But if you forget the passphrase, your funds are unrecoverable. I recommend practicing passphrase recovery within a low-value test wallet first. See passphrase-25th-word-guide and seed-phrase-management for deeper discussion.
Connectivity, firmware & daily use
USB, Bluetooth, and NFC each have implications. USB is predictable and auditable. Bluetooth adds convenience for mobile use. NFC is limited to specific interactions. Is Bluetooth safe? It can be safe if you follow best practices: pair in a trusted environment, keep firmware current, and avoid unknown networks.
Firmware updates fix bugs and patch vulnerabilities. I apply updates in a controlled way: backup recovery phrase, confirm authenticity using the companion app prompts, and update on a trusted machine. If you want step-by-step update procedures, see firmware-update-guide and verify-authenticity.
Daily usage is straightforward once apps are installed: verify the address on-device before sending funds. I make this non-negotiable—never trust a copied address without on-device confirmation.
Multisig and cold-storage strategies
Multi-signature (multisig) setups can reduce single-point risk. A simple example: a 2-of-3 multisig where one key lives in a hardware wallet at home, the second is on a hardware wallet in a safe deposit box, and the third is held in a trusted executor’s secure location.
Multisig increases resilience against theft and single-device failure, but it’s more complex operationally (fee management, wallet compatibility). If you’re interested, see our multisig-for-ledger and cold-storage-strategy pages.
Supported coins & ecosystem
These devices support Bitcoin, Ethereum including DeFi ERC-20 tokens, and many other blockchains like Solana, Cardano, Tezos and more through third-party apps and integrations. If you rely on a specific chain or NFT flow, check the compatibility and wallet integrations first (supported-coins, ledger-and-ethereum-defi, ledger-and-solana-nfts).
App integrations (Metamask, Phantom, etc.) are common. Use the official integration guides and confirm transaction details on-device.
Comparison table
| Model |
Form factor |
Good for |
Notes |
| Nano S review |
Compact |
Entry users and cold storage |
Simple form factor, solid for basic non-custodial use |
| Nano S Plus review |
Compact |
Users needing more app capacity |
Upgraded storage and UX improvements |
| Nano X review |
Portable |
Mobile users who want Bluetooth |
Easier phone pairing (evaluate Bluetooth risk) |
| Stax review |
Premium |
Users who want larger screen & UX |
Different interaction model; check app compatibility |
(Links go to full model reviews for deeper technical details.)
Common mistakes & troubleshooting
Buying from unofficial sellers, storing your recovery phrase digitally, and failing to verify transaction addresses are the top three mistakes I see. Never type your seed phrase into a computer or phone. If you run into connectivity issues or need to recover funds, the pages troubleshooting-connectivity and recover-if-device-lost are practical resources.
FAQ
Q: Can I recover my crypto if the device breaks?
A: Yes, if you have the recovery phrase and private keys were stored non-custodially. See restore-recovery-phrase for instructions.
Q: What happens if the company goes bankrupt?
A: Your private keys are yours. Non-custodial storage means the company’s status doesn’t directly impact access, provided you have your recovery phrase.
Q: Is Bluetooth safe for a hardware wallet?
A: It can be, but it expands the attack surface. For maximum safety use wired connections or fully air-gapped workflows.
Q: What is the passphrase (25th word)?
A: An optional layer that creates hidden wallets. Powerful but dangerous if forgotten. See passphrase-25th-word-guide.
For more questions see our full FAQ and troubleshooting sections.
Conclusion & next steps
In my testing, Ledger hardware wallets offer a practical balance of usability and protection for most non-custodial users. They are not magic; they enforce better habits. Choose a model based on how you use crypto (mobile vs desktop, single-sig vs multisig), practice recovery procedures on low-value funds, and store backups in robust, distributed ways.
Want a setup walkthrough or model-by-model comparison? Start with the setup-ledger-step-by-step guide or browse model comparisons to match features to your threat model.
And if you have a specific scenario—inheritance planning, large multisig deployment, or an air-gapped build—read inheritance-planning-for-crypto and advanced-air-gapped next.