A mirrored, speaker-friendly layout for onboarding devices with clarity and security at the center.
This presentation will guide you through powering up your device, creating secure backups, verifying recovery phrases, connecting to trusted software, and keeping routine maintenance habits to reduce risk.
Speaker note: emphasize the importance of authenticity — always verify packaging and documentation and only trust official downloads.
Inspect seals, packaging, serials, and physical condition before powering on.
Speaker note: show photos of a correct box vs. a tampered one when presenting live.
Use the provided cable, connect to a phone or computer only when instructed, and follow on-device prompts carefully.
Speaker note: stress that the device will never ask for the phrase after setup except to verify it during the secure validation step.
The recovery phrase is the single most important element of device ownership — protect it like a legal title.
Speaker note: Mention multi-location storage and the tradeoff between convenience and redundancy. For large holdings, consider professional services for secrets storage but beware of custodial risk.
Always verify the recovery phrase using the device's built-in verification procedure.
Verification ensures the recovery phrase was recorded correctly and can be used to restore access later if the device is lost or damaged.
Speaker note: Walk through a demonstration in a private environment — do not expose actual recovery words during a public demo.
Only install firmware and companion software from official sources. Verify checksums and signatures when available.
Speaker note: Explain why automatic updates can be safe when provided by a trusted vendor, but also why reviewing changes matters for advanced users.
Use trusted hosts and inspect transaction details on the device before approving.
Speaker note: Live-demo signing flow using a testnet or simulation to avoid risking funds while teaching.
Plan for loss, theft, and device retirement. Keep a recovery-tested plan that others can execute if needed.
Consider the lifecycle of your keys: periodic checks, safe storage replacement over time, and an emergency access plan that balances privacy and recoverability.
Speaker note: Discuss legal considerations such as inheritance planning and local regulations that could affect access to assets after loss of life or incapacitation.
If issues arise, consult official knowledge bases and support channels. Avoid third-party fixes that ask for your recovery phrase.
Speaker note: Provide official support contact methods and encourage users to create support tickets through the vendor's site when needed.
Short answers to frequently asked questions and next steps for attendees.
Speaker note: Provide attendees with a handout summarizing the steps and links to trusted resources for deeper reading.