Page 29 - Ledger Nano X User Manual
P. 29
● Ledger HW.1
Arbitrary list of third-party software wallets
Software wallet security
Software wallets are highly insecure, have not been subjected to a security audit by
Ledger and they should only be used for recovery as a last resort. If you proceed to use
one of the software wallets below, you accept the responsibility for any possible
outcome.
● Mycelium (smartphone)
● Electrum (desktop)
● Bither (smartphone/desktop)
● Coinomi (smartphone)
● Jaxx Liberty (smartphone)
● MyEtherWallet
● MyCrypto
Generate private keys (advanced)
Advanced users can manually generate all private keys using Ian Coleman's BIP39
tool. This tool is best downloaded for offline use, as instructed below.
Generate your private keys
1. Download the BIP39 tool at the bottom of this article or view the source
on GitHub.
2. Double-click the downloaded file to open it in a browser.
3. Type your 24-word recovery phrase in the field BIP39 Mnemonic. Use lowercase
only.
4. Type your passphrase if you set one in your Ledger hardware wallet.
5. Select a cryptocurrency.
6. Leave the field Internal/External at 0.
Import your private keys
1. Copy the list of generated private keys from the Derived Addresses section. Use
the controls below the list to show more rows or start at a certain index.
2. Import your private keys in a third-party wallet that supports this, such as
MyEtherWallet or Armory.
3. Set the field Internal/External to 1 to generate the private keys of your change
addresses.
4. Import the private keys associated with your change addresses in the third-party
wallet.
28