Unbox & inspect
Remove the device from its packaging and check the tamper-evident seal (if present). Confirm the box and contents match the documentation. If anything looks suspicious, contact the vendor and do not proceed.
Connect to your computer
Use the supplied cable to plug the device into a trusted computer. Only connect to official or well-known setup portals. Never connect the device to a computer you do not control or that may be compromised.
Initialize & choose a PIN
Follow on-screen prompts to create a secure PIN. Choose a length and digits that you can remember but are not trivial. The device will lock if disconnected and will require the PIN to operate.
Write down your recovery
Write the recovery words precisely in the order shown. Use the physical recovery card supplied or a high-quality notebook kept in a secure place. Do not photograph, type, or store the phrase on an internet-connected device.
Verify & finalize
Confirm the recovery phrase on the device when prompted and run a quick test transaction with a small amount. Once verified, your device is ready to use.