Welcome to the Apex of Crypto Protection
You’ve taken the most critical step in safeguarding your digital wealth: acquiring a certified hardware security key. This device is your personal vault, designed to keep the secret keys to your assets isolated from internet threats. This comprehensive guide will walk you through the proper and secure initialization process, ensuring your assets are protected from day one.
The entire setup process involves two main components: your physical device and the official companion desktop/mobile application, which acts as a secure interface. It is paramount that you only download this application from the official source, as malicious versions are a common threat. **Always double-check the URL.**
01
Initial Setup: Device and Application
Your first step is to prepare your environment. Unbox your device, confirming all seals are intact and the contents match the official packaging list. Next, install the necessary management software.
- **Software Installation:** Navigate directly to the official company website and download the genuine companion application for your computer or mobile device. Install the application but do not proceed until your hardware is ready.
- **Power On:** Use the supplied cable to connect your hardware device to your computer or a power source (if using a wireless model). The device screen should illuminate and display a "Welcome" or initial instruction message.
- **Navigate the Device:** Use the physical buttons on your device (typically one on each side, or a scroll and select combination) to move through the initial screens. The on-screen instructions will guide your physical movements.
- **The First Instruction:** The device will prompt you to "Set up as new device." Select this option by pressing both buttons simultaneously (or the designated select button).
02
Creating Your Unique Security Code
The security code is your immediate line of defense. It is required every time you wish to unlock and use your hardware key. Choose a code that is easy for you to remember but extremely difficult for anyone else to guess. We recommend a code of 6 to 8 digits for optimal security.
- **Initiate Code Selection:** On your device screen, select the option to "Choose new code."
- **Enter Digits:** Use the buttons to cycle through the digits (0-9). Press both buttons to confirm each digit. An 8-digit code provides the best protection.
- **Confirmation:** After entering your chosen sequence, select the checkmark icon and press both buttons to confirm. You will then be prompted to re-enter the exact sequence one more time to verify it’s correct. **Do not write this code down next to your recovery phrase.**
**Security Tip:** Never share your security code with anyone. If you forget it, your recovery phrase is the only way to regain access to your digital assets.
03
Writing Down Your Master Key (Recovery Phrase)
This is the most critical step. Your device will now generate a unique, sequential list of 24 words. This sequence, often referred to as a "seed," is the master private key to all your funds, regardless of the type of device you use. **If you lose this phrase, your assets are lost forever.** **If someone gains access to it, they gain full control of your assets.**
- **Prepare Your Sheets:** Take the dedicated recovery sheets provided in your product box. Use a reliable pen.
- **Display and Record:** The device will display the words one by one (Word #1, Word #2, etc.). For each word, carefully and legibly write it down in the corresponding numbered space on your sheet. **Double-check the spelling and order.**
- **Advance Through the Words:** Press the right button to move to the next word. Repeat the process until you have accurately recorded all 24 words.
- **Verification Check:** After the 24th word, the device will prompt you to confirm your phrase. It will ask you to select specific words from your list to ensure you recorded them correctly. Use the buttons to navigate to the correct word and press both buttons to validate.
Once verified, your device will display a confirmation message: "Your device is ready." You have completed the essential, secure initialization.
04
Secure, Offline Storage is Vital
The physical security of your 24-word master key determines the security of all your digital assets. **It must be kept completely offline and physically secured.**
- **No Digital Copies:** Absolutely do not take photos, store it on a cloud service, email it, or type it into any electronic device (computer, phone, tablet). Digital copies are vulnerable to malicious programs and breaches.
- **Multiple Secure Locations:** Store at least two physical copies in different, highly secure locations, such as a fireproof safe, a safety deposit box, or a secret location only known to you. The locations should be geographically separated if possible.
- **Durability:** Consider transferring your phrase to a more durable, metal backup solution to protect against fire or water damage.
05
Verify Authenticity and Connect to the Interface
Your device is now initialized. The final steps involve connecting it to the companion application and performing a critical authenticity check to ensure your hardware is genuine.
- **Start Application Setup:** Open the companion application on your computer or mobile device. Select the option to "Initialize a new device."
- **Follow Prompts:** The application will guide you to connect your hardware key via the cable or secure wireless connection.
- **The Authenticity Check:** The application will perform a 'Genuine Check' by communicating with your device’s secure chip. This is a fundamental security feature that confirms your device is a certified, unaltered product. Press both buttons on your physical device when prompted to "Allow access" or "Confirm Manager."
- **Access Granted:** Upon a successful check, you will gain access to the main dashboard of the companion application. This secure interface is where you will install asset management modules and view your portfolio.
Next Steps: Installing Asset Management Modules
Your hardware key is now ready to protect your assets. To begin managing different cryptocurrencies, you must install the specific 'Asset Management Modules' onto your device through the 'Manager' section of the companion application. These modules allow your hardware key to understand and sign transactions for those specific blockchains.
Congratulations! You are now equipped with an industry-leading level of security for your digital wealth. Always prioritize the security of your 24-word master key above all else.