1. Install Essential Application

Begin by downloading the secure desktop application from the official source. This application facilitates communication with your secure hardware. **Do not use third-party links.**

  • Download: Obtain the correct application for your computer's operating system (Windows, macOS, or Linux).
  • Run Installer: Execute the downloaded file and follow the on-screen prompts for installation.
  • Launch: Open the application once installation concludes to proceed.
---

2. Configure Hardware Access

Connect your physical access mechanism to the computer using the provided cable. The application should automatically detect the presence of the new hardware.

  • Connect: Plug the USB interface from the hardware into an available port.
  • Initialization: The hardware screen will display a welcome message. Select the "Setup new device" option.
  • Choose PIN: Establish a robust, unique numerical code for daily access. **Memorize this immediately.**
---

3. Secure Backup Procedure

This is the most critical operation. The device will generate a unique sequence of words, the **Recovery Sequence**. This sequence is the only way to restore your access if the physical hardware is lost or damaged.

  • Transcribe: Carefully write down every word on the designated paper card. Check each word for accuracy.
  • Confirm: The hardware will ask you to verify specific words from your written sequence.
  • Storage: Keep the written sequence in an extremely safe, secret location, totally offline. **Never photograph or digitally store this sequence.**
---

4. Final Verification & Access

After successfully securing your backup, the device is now prepared for secure operations. You may now manage assets through the installed application.

  • Dashboard Check: Confirm the application displays a "Ready" status for your connected hardware.
  • Explore: Familiarize yourself with the interface for asset management.
  • Congratulations: Your secure hardware setup is complete!