Welcome to Ledger® Live: Desktop — your local interface for securely managing crypto assets and NFTs using a Ledger hardware wallet. This guide provides practical instructions for installing, logging in, securely configuring, and using Ledger Live on desktop platforms. It also explains advanced topics, troubleshooting, and operational best practices.
Ledger Live is designed so that cryptographic private keys remain on your hardware device while the desktop app provides a friendly dashboard, transaction composition and verification, portfolio insights, and third-party integrations. Treat the hardware device as the single source of truth for signing and authorizing blockchain transactions.
Always download Ledger Live from the official Ledger website. Avoid links from social media or third-party sources. After downloading, verify the file signature if Ledger provides one — this prevents tampered installers.
Ledger Live supports Windows, macOS, and major Linux distributions. On Windows, run the installer (.exe) as an administrator. On macOS, mount the .dmg and move the app to your Applications folder. On Linux, follow the distro-specific instructions or use the AppImage when available.
Connect the Ledger hardware wallet via USB or supported USB-C cable. On some computers you may need an adapter. Wait for the device screen to show the home menu.
Launch Ledger Live. The app detects your device and requests permission to communicate. Confirm on the physical device when prompted; only approve trusted interactions by verifying details on the device screen.
Unlock your device by entering the PIN directly into the hardware wallet. Never enter your PIN in the desktop application — it must only be entered on the device itself.
After unlocking, Ledger Live synchronizes account information (balances, transaction history) with remote nodes and indexers while never transferring private keys. Sync speed depends on network and account count.
Your 24-word recovery phrase is the ultimate secret for restoring access to your keys. Write it down on the supplied card or a backup metal plate. Never store it digitally (photos, cloud, text files). Never share it with anyone.
Keep your Ledger device firmware and Ledger Live app up-to-date. Updates may patch vulnerabilities, add new features, and improve compatibility. Only apply updates from within official Ledger channels.
Scammers impersonate Ledger via fake websites, emails, and chat. Always verify URLs, never enter recovery words anywhere, and never accept unsolicited help that requests secrets.
For every transaction, cross-check recipient addresses, amounts, and fees on the device display before approving. The hardware wallet display is the last trusted layer before signing.
Ledger Live displays an aggregated portfolio view: assets, fiat valuations, performance charts, and recent activity. Use filters to focus on specific tokens or time ranges.
Compose transactions within Ledger Live and validate them on-device. Use QR codes for convenience or paste addresses carefully. For high-value transfers, consider test transactions first.
Integrated partners enable buying crypto, swapping between tokens, or staking/earning yield. Third-party services often require regulatory checks; Ledger Live acts as an interface, but third-party custody and terms apply separately.
Ledger Live supports many blockchains via dedicated apps on the device. Install only the apps you need to minimize firmware footprint.
Ledger Live can display NFTs associated with supported accounts. Metadata and previews depend on remote metadata services. Ownership is always provable on-chain.
Transfer NFTs by selecting the appropriate account and initiating a send. Confirm token IDs and destination addresses on-device. Beware of marketplace fees and royalties that may apply.
Metadata can be manipulated on some platforms; ownership is the only cryptographic guarantee. Never click unknown links promising fast NFT sales or airdrops without verifying contract addresses.
Ledger Live integrates with decentralized applications (dApps) via connect flows — always review requests on-device. Use compatible browser extensions or WalletConnect where supported and verify the session origin.
For advanced transactions (e.g., DeFi operations), understand gas/fee dynamics. Ledger Live often provides recommended fee tiers; you may set custom fees where supported for faster confirmation.
Create separate accounts per asset or strategy. Use descriptive names and tags to track purpose (e.g., "savings", "trading", "cold-storage"). Maintain separate recovery or multisig arrangements for higher security.
Ensure the cable and port are functional. Try a different USB port or cable and disable OS USB power-saving features. On some Macs, changing security/privacy settings for kernel extensions may be necessary.
Network congestion or indexing delays can temporarily hide transactions. Re-sync accounts, check block explorers with transaction IDs, and ensure you are on the correct network.
If an update fails, follow the official recovery instructions — do not attempt to restore firmware from untrusted sources. Contact official Ledger support if you suspect device corruption.
For very large holdings, consider air-gapped or cold-storage processes where the signing device is kept offline except for transaction signing. Use separate, minimal systems for signing and broadcasting when extreme security is required.
Keep multiple physical backups of your recovery phrase in secure locations. Consider metal backup solutions resistant to fire and water. Test recovery procedures occasionally using a spare device.
Avoid mixing high-risk browsing with wallet operations on the same machine. Use reputable antivirus, keep system software patched, and isolate wallet use from casual web surfing.
A secret cryptographic value that authorizes spending for a blockchain address. Private keys must remain confidential.
A human-readable series of words (usually 24) that encodes a private key seed. The recovery phrase allows full restoration of wallet access.
A physical device that stores private keys offline and performs transaction signing in a tamper-resistant environment.
For unresolved issues, use official support channels. Beware of impostor support that requests recovery phrases or secrets.