Welcome to Ladger — start here

This page is a focused, plain-language guide to getting started with a hardware security device and companion app. It explains why hardware isolation matters, how typical setup flows work, and practical habits that keep your assets safer over time. When you are ready to access your account, use the login button below — this page intentionally shows a single, clear action to make the next step obvious.

Hardware Isolation
Secure PIN
Companion App
Phishing Protection

Protecting digital assets begins with controlling the private keys. A hardware security device stores private keys in a dedicated secure element and ensures signing operations occur inside the device. That means your secret material never needs to live on an internet-connected computer or phone. When you approve a transaction, the device shows the transaction details on its own screen and requires a physical confirmation. This two-channel model — host application on one side, secure, verifiable device display on the other — greatly reduces the risk that malware or phishing can trick you into signing a malicious transaction without noticing it.

Setting up a new device is simple but must be treated with care. Typical steps include unboxing, powering on, choosing a secure PIN, and either generating a new recovery phrase or restoring an existing one. The recovery phrase — usually a list of words — is the master backup that can recreate your wallet if the device is lost or damaged. Because it is the single most important secret, handle it like cash: write it on paper or durable metal, keep it offline, and store it in a secure location. Avoid photographing or typing the phrase into any online system. For durability, consider metal backup plates designed to resist fire and water.

During setup, select a PIN that is memorable for you but not easily guessed by others. Do not choose trivial PINs such as repeated digits or obvious sequences. If someone obtains your device, the PIN acts as the first layer of protection; the recovery phrase is the last. For enhanced safety, check whether your device supports additional passphrase features and learn how they work before enabling them — they can add meaningful protection but require careful management.

Companion software — typically a desktop or mobile app — provides a user-friendly interface for account management, balance checks, firmware updates, and app installation on the device. This host software communicates with the device but never exports private keys. Always download companion apps from official channels and verify the source when possible. When a transaction is requested, confirm the recipient address and amount on the device display; never rely solely on the host display or copy-paste for verification, especially for long addresses. If your device displays a shortened or altered address, pause and investigate; hardware devices provide a reliable channel to validate what you are signing.

Firmware updates are an important element of device maintenance. They bring security improvements and new compatibility. Only install firmware updates from the official companion app and follow the device prompts carefully. If an update seems unexpected, or if you receive unsolicited messages urging immediate action regarding your device, treat them with skepticism. When in doubt, consult official documentation or support resources before proceeding. Keeping firmware current is a balance between prompt protection and cautious verification; both matter.

Phishing attacks continue to be a leading threat. Attackers create convincing fake websites and communications that mimic legitimate vendors to trick users into revealing their recovery phrases or installing malicious software. Remember: no legitimate support team or service will ask for your recovery phrase. Bookmark the official site, check URLs before entering sensitive information, and avoid clicking on links from unknown messages. Use different passwords across services and enable two-factor authentication for critical accounts to reduce collateral risk if an unrelated account is compromised.

When interacting with decentralized applications and smart contracts, exercise caution. Smart contracts can request approvals that allow them to spend tokens on your behalf; always review the exact permissions and the contract address. If you are experimenting with a new service, test with small sums first and consider using a dedicated account for risky interactions. Regularly review token approvals and revoke those you no longer need. This reduces the chance that a compromised or malicious contract can move significant funds without your knowledge.

Operational security extends beyond the hardware device. Keep backup copies of recovery information in secure, geographically separate locations if you have significant holdings. Document recovery steps clearly for trusted executors or family members, ideally with legal guidance for estate planning. For organizations, implement role-based access and multi-person controls — a single person having unilateral access to recovery phrases creates single points of failure. Formalize processes and run recovery drills to ensure procedures work under stress.

Adopt a layered approach: use a hardware device for long-term custody, maintain a small spending balance in a convenience wallet for day-to-day needs, and segregate funds by purpose. Reevaluate the strategy periodically as your holdings and needs change. Stay informed about best practices and community recommendations, and verify information against official resources. If you ever suspect your device, PIN, or recovery phrase has been compromised, move funds to a new wallet generated from a fresh recovery phrase as quickly as possible to limit exposure.

This page aims to provide a clear foundation that helps you make informed, practical choices when securing digital assets. It is not a substitute for the detailed guides and official support channels provided by device vendors, but it should give you a confident starting point. When you're ready to proceed, click the login button below to begin the secure sign-in flow. The login flow will guide you through connecting your hardware, entering your PIN on the device, and confirming any transactions on-device. Keeping the interactive surface minimal — a single, clearly labeled login button — helps reduce accidental clicks and keeps the path forward deliberate and secure.

Account access
Click the button below to begin the secure login flow. The device and companion app will prompt you to connect, enter your PIN, and confirm actions on-device.