The hardware wallet is connected to the computer via USB. The application recognizes the device and prepares a secure communication channel.
The user unlocks the device directly on its screen using a PIN. This step prevents unauthorized physical use.
An encrypted session forms between the device and Ledger Live. No private keys leave the hardware wallet.
Any action requiring authorization must be approved on the hardware wallet display.
Ledger Live access is not based on usernames or passwords stored on a server. The hardware wallet acts as the authentication key, meaning security depends on device possession and cryptographic verification rather than account credentials.
The computer runs the interface and displays balances, but it does not store private keys. Even if compromised, it cannot sign transactions without hardware approval.
The device stores cryptographic secrets and performs signing operations internally. Its screen shows transaction details before approval.
There is no centralized account database holding login credentials.
Because keys remain offline, fake websites cannot steal wallet access without the physical device.
The recovery phrase is never required for normal app access and should remain offline.