Ledger Live Desktop is the official application for interacting with Ledger hardware wallets on Windows, macOS and Linux. It provides a secure, local interface to create and manage accounts, send and receive cryptocurrency, install apps on your Ledger device, perform firmware updates, and access additional features such as staking and portfolio tracking. This guide explains everything you need to get started — from verifying downloads and installing the app to practical security tips and common troubleshooting steps.
Why use Ledger Live Desktop?
Ledger Live is designed so private keys never leave your Ledger device. The desktop app acts as a wallet management UI while all signing actions happen on the hardware. Compared with purely web-based tools, the desktop client reduces attack surface, gives you offline-friendly operation, and often shows the most complete feature set (portfolio, device manager, exchanges integration, staking support). For regular, secure access to your Ledger wallet, the Desktop app is the recommended option.
Before you begin — safety checklist
- Always download Ledger Live from the official Ledger domain. Avoid search-engine links that look similar to the official site.
- Use a clean, up-to-date computer that you control. Avoid public or shared machines for initial setup.
- Have a secure, offline method to record your recovery phrase (paper, metal backup). Never photograph or store the phrase in cloud storage.
- Keep your Ledger device box/seal; inspect packaging for tampering when you receive it.
Step 1 — Download Ledger Live
Open a browser and visit https://www.ledger.com/ledger-live/download. The page automatically detects your operating system; select the correct download for Windows, macOS or Linux if needed. Ledger publishes checksums and installer signatures — if you are security-conscious verify the file integrity before installing.
Step 2 — Install the application
Run the downloaded installer and follow on-screen prompts. On macOS you may need to approve the app in System Preferences → Security & Privacy. On Linux follow the distribution-specific instructions (AppImage or package). After installation, launch Ledger Live.
Step 3 — Set up or restore your Ledger device
Connect your Ledger hardware wallet (Nano S Plus, Nano X, etc.) using the USB cable. Ledger Live will detect the device and guide you through two options: Initialize as a new device or Restore device from recovery phrase.
- If you have a brand new device, choose to create a new wallet, set a secure PIN code on the device, and write down the recovery phrase exactly as shown.
- If you already have a recovery phrase from another wallet, follow the restore option and input the phrase using the device buttons.
The recovery phrase (usually 24 words) is the single most important backup. Keep it offline and split copies if necessary for disaster resilience.
Step 4 — Add accounts in Ledger Live
After your device is initialized and unlocked, Ledger Live lets you add accounts for the cryptocurrencies you want to manage. Click Add account, pick the currency (Bitcoin, Ethereum, etc.), and Ledger Live will derive addresses from your device. Each account has its own receive address, balance and transaction history.
Step 5 — Sending and receiving funds
To receive: Select an account, press Receive, and copy the address shown. Always verify the address on your Ledger device screen — this ensures
a malware on your computer hasn’t altered the address.
To send: Use the Send flow in Ledger Live, paste or type the recipient address, set amount and fee, then confirm the transaction details on your hardware device.
Signing always occurs on the device — Ledger Live only prepares and broadcasts the transaction.
Device Manager & firmware updates
Ledger Live includes a Manager section to install or remove cryptocurrency apps on the device and to update firmware. Firmware updates are critical for security and should be applied when offered; Ledger Live will guide you through the update and require physical confirmation on the device. Never install firmware from third-party sources.
Security best practices
- Verify every transaction on the hardware screen; never approve blindly from your computer.
- Never enter your recovery phrase into a computer or online form. It only belongs on the device during recovery and on your offline backup.
- Use a strong uni