Starting Up Your Device — Friendly, Fast, Secure
A modern, secure walkthrough to get your hardware wallet awake, paired, and protecting your digital assets. This guide uses new phrasing and approachable metaphors so first-time users can follow confidently.
1. Unbox & Inspect
Open the package and confirm tamper evidence. The new phrase we use is "seal integrity" — check for intact security stickers and no visible damage. If anything looks altered, stop and verify with your vendor.
2. Power & Connect
Attach your device to a clean USB port. Use the cable that came in the box or a trusted replacement. When the device powers, you'll see a friendly welcome screen on the hardware and a prompt in your browser: Start.
3. Initialize — Seed Mode
Choose how to initialize: create a new seed or restore from an existing one. We'll call the generated secret the guardian seed to emphasize protection. Write it down on the included card — do not photograph it.
4. PIN & Lock
Set a PIN to lock the device. Aim for a memorable yet non-obvious number. The device will confirm twice. Treat this PIN like a front-door code: protective, changeable, and never shared.
Clear Steps — What to Expect
When you power up the device for the first time, the interface will guide you through screens that confirm connections, firmware authenticity, and prompt you to choose recovery options. We use new terms to avoid jargon: your recovery words will be called your guardian phrase (instead of 'seed phrase'). This helps users understand it is a protective layer — not a password to type online.
Verify Firmware
Before you proceed you will be asked to verify device firmware. This is an integrity check that ensures the code running on the device matches the official release. Accept only when the device shows a validation badge. If the browser shows warnings, follow the on-screen instructions or consult support.
Record Your Guardian Phrase
Write down every word in order on paper. The phrase is the ultimate recovery tool — losing it can mean permanent loss of access. Never store it digitally or in cloud photos. Consider using a fireproof, waterproof note sheet designed for long-term storage.
Security Best Practices
Adopt the following protective habits: maintain seal integrity, always verify firmware authenticity, and store your guardian phrase offline in at least two geographically separated locations. Consider splitting your phrase using a technique called shard backup with trusted custodians or secure hardware splitters.
Minimal Exposure
Do not enter your guardian phrase into any website or app. If asked to type it, treat it as a phishing attempt. Use the device's built-in confirmation screens for actions requiring signing.
Recovery Drills
Regularly run a controlled recovery drill: restore to a spare device and confirm addresses. This ensures your guardian phrase is correct and retrievable if needed.
Troubleshooting & Common Questions
If your device doesn't respond, try these steps: test the USB cable in another port, reboot the host computer, or try a different host device. For connectivity hiccups, clear browser cache and ensure the companion web app is up to date. If the device reports firmware mismatch, contact support and do not proceed until resolved.
Forgot PIN?
If you forget your PIN, the device can be reset but you will need your guardian phrase to recover funds. This is why storing the phrase securely is essential. The reset process is irreversible unless the guardian phrase is available.
Glossary — Fresh Words & Simple Meanings
Seal Integrity: A quick check that packaging and tamper-evidence are intact. Guardian Phrase: The ordered set of recovery words saved on paper. Guardian Seed: The underlying entropy used to create keys; treated as the root of protection. Shard Backup: A split of the guardian phrase into parts for safer distribution.
Design Tips for Presenters
This slide template is made for clean, high-contrast delivery. Use short bullet lines (max 8–10 words per line) and 2–3 visuals per slide to retain attention. Call out the single action you want the audience to remember with an accent pill — e.g., "Record your guardian phrase offline."
Next Steps & Resources
After setup: test a small transaction, confirm addresses on-device, and schedule a recovery drill. Keep firmware updated and follow official release notes. For deeper security posture, explore hardware-enforced multi-signature arrangements and cold-storage vaulting.