Mirror Presentation — Starting® Up® Your® Device®
A modern mirrored layout for step-by-step onboarding & security best practices
Prepared: Mirror Format • Accessible • Printable

Getting Started — What this walkthrough covers

This presentation will guide you through powering up your device, creating secure backups, verifying recovery phrases, connecting to trusted software, and keeping routine maintenance habits to reduce risk.

Key objectives:
  1. Power & initial configuration
  2. Create and verify a secure recovery phrase
  3. Understand safe connection & firmware practices

Speaker note: emphasize the importance of authenticity — always verify packaging and documentation and only trust official downloads.

Unboxing & Inspect

Inspect seals, packaging, serials, and physical condition before powering on.

Tip: If the device packaging is tampered with or appears unusual, stop and contact the seller or vendor before proceeding.

Checklist

  • Box intact, seals unbroken
  • Device matches vendor description and serial number
  • Accessories present (cables, recovery card, documentation)
  • Official quickstart card or instructions included

Speaker note: show photos of a correct box vs. a tampered one when presenting live.

Power & Initial Setup

Use the provided cable, connect to a phone or computer only when instructed, and follow on-device prompts carefully.

Never enter recovery words into a computer or phone — only on the device when prompted.

Step-by-step

  1. Connect the device to power or to a trusted host following the quickstart instructions.
  2. Choose language, time/date (if prompted), and set a strong device PIN when requested — avoid obvious numbers.
  3. When asked to create a recovery phrase, do so on the device; write each word on the provided recovery card in order.

Speaker note: stress that the device will never ask for the phrase after setup except to verify it during the secure validation step.

Recovery Phrase

The recovery phrase is the single most important element of device ownership — protect it like a legal title.

Best Practices

  • Write words clearly and in order on the recovery card that came with the device.
  • Store copies in separate secure physical locations (safe deposit, home safe), not digitally.
  • Consider crypto-safe backup solutions such as metal recovery plates for fire and water resistance.
  • Never photograph, email, or otherwise digitize your recovery words.

Speaker note: Mention multi-location storage and the tradeoff between convenience and redundancy. For large holdings, consider professional services for secrets storage but beware of custodial risk.

Verify Your Backup

Always verify the recovery phrase using the device's built-in verification procedure.

Why verify?

Verification ensures the recovery phrase was recorded correctly and can be used to restore access later if the device is lost or damaged.

Verification steps:
  1. Initiate the device's "confirm recovery" routine following the prompts.
  2. Carefully confirm each word and its order when requested by the device.
  3. If any discrepancy occurs, create a new backup and destroy the old one safely.

Speaker note: Walk through a demonstration in a private environment — do not expose actual recovery words during a public demo.

Firmware & Software Safety

Only install firmware and companion software from official sources. Verify checksums and signatures when available.

Guidance

  • Download software from official vendor domains or verified app stores.
  • Check the vendor's site for firmware release notes and verification instructions.
  • Enable automatic updates only when you trust the update source; review release notes for breaking changes.

Speaker note: Explain why automatic updates can be safe when provided by a trusted vendor, but also why reviewing changes matters for advanced users.

Connecting & Transacting

Use trusted hosts and inspect transaction details on the device before approving.

Transaction safety checklist

  1. Confirm receiving address and amount directly on-device.
  2. Double-check the purpose of the transaction and any memo fields before approval.
  3. Keep system software on your host up to date to prevent host-level malware.

Speaker note: Live-demo signing flow using a testnet or simulation to avoid risking funds while teaching.

Maintenance

Plan for loss, theft, and device retirement. Keep a recovery-tested plan that others can execute if needed.

Long-term planning

Consider the lifecycle of your keys: periodic checks, safe storage replacement over time, and an emergency access plan that balances privacy and recoverability.

Speaker note: Discuss legal considerations such as inheritance planning and local regulations that could affect access to assets after loss of life or incapacitation.

Troubleshooting

If issues arise, consult official knowledge bases and support channels. Avoid third-party fixes that ask for your recovery phrase.

Common scenarios

  • Device not powering: try alternate cable/port and ensure power source is sufficient.
  • Broken screen or buttons: verify warranty and contact the official support channel.
  • Lost recovery phrase: if you still have device access, create a new backup now; otherwise, restoration will require the phrase.

Speaker note: Provide official support contact methods and encourage users to create support tickets through the vendor's site when needed.

FAQs & Closing

Short answers to frequently asked questions and next steps for attendees.

Common questions

Q: Can I back up recovery words digitally?
A: No. Storing recovery phrases in plain digital form substantially increases risk.
Q: Can a vendor recover my funds?
A: No — the recovery phrase is the only way to restore keys; vendors cannot access individual recovery secrets.
Q: Can I share my device with a partner?
A: Use multisig or dedicated co-signers rather than sharing a single recovery phrase or PIN.

Speaker note: Provide attendees with a handout summarizing the steps and links to trusted resources for deeper reading.