Thank you for choosing to secure your digital assets with this trusted hardware device. Here begins your guided setup experience. We are committed to protecting your privacy, keeping your keys offline, and ensuring you are the only one who controls access to your holdings. This document walks you through every essential step from unboxing to active use.
This initial setup matters. It lays the foundation for all future uses. By following proper steps now, you guard against losses due to lost seeds, weak PINs, counterfeit devices, or compromised software. Your device hardware is designed to protect you. Your actions determine how well that protection works.
1. Unbox and inspect. When you remove the packaging, ensure the seal and any security identifiers are intact. Any obvious damage or tampering should be noted before moving ahead.
2. Connect the device. Use the supplied cable to plug the device into your computer’s USB port. The device should power on and display a welcome prompt or “start” message. Do not force any parts; everything should fit smoothly.
3. Install the official software suite. On the computer, install the application designed for device management. This software will help you download firmware, generate your recovery seed, and track device status. Allow the installer to proceed only if file integrity checks succeed.
4. Firmware verification and installation. If the device arrives without firmware or with an older version, the software will prompt you to install or update. Follow prompts carefully. The update is digitally signed to protect against malicious versions.
#BBD0E0 »