Fast start — 6 steps to initialize
Common threats & simple defenses
Understanding typical attack vectors helps you prioritize defenses. Remote malware aims to trick you into signing transactions. Phishing sites try to impersonate official apps. Physical theft attempts to access the device — but a PIN and passphrase protect most scenarios. The simplest and most effective defenses are: verify addresses on-device, never store your recovery seed digitally, and keep backups physically separate.
Quick troubleshooting
If the device appears pre-initialized, stop and contact support. If you forget your PIN, the device will require a factory reset; restore from your recovery seed to regain access. If firmware verification fails, do not proceed — contact the official support channel.
Advanced tips (when you're ready)
- Passphrase: Adds a second secret that creates hidden wallets — powerful but adds recovery complexity.
- Multisig: Use multiple devices or cosigners to remove single points of failure for large holdings.
- Air-gapped signing: Use a device without a direct host connection and transfer signed transactions via QR/SD for maximum isolation.
bc1qexampletestaddress0000000000000000000000