Manual

Ledger HW.1
Arbitrary list of third-party software wallets
Software wallet security
Software wallets are highly insecure, have not been subjected to a security audit by
Ledger and they should only be used for recovery as a last resort. If you proceed to use
one of the software wallets below, you accept the responsibility for any possible
outcome.
Mycelium(smartphone)
Electrum(desktop)
Bither(smartphone/desktop)
Coinomi(smartphone)
Jaxx Liberty (smartphone)
MyEtherWallet
MyCrypto
Generate private keys (advanced)
Advanced users can manually generate all private keys using Ian Coleman's BIP39
tool. This tool is best downloaded for offline use, as instructed below.
Generate your private keys
1. Download the BIP39 tool at the bottom of this article or view the source
on GitHub.
2. Double-click the downloaded file to open it in a browser.
3. Type your 24-word recovery phrase in the field BIP39 Mnemonic. Use lowercase
only.
4. Type your passphrase if you set one in your Ledger hardware wallet.
5. Select a cryptocurrency.
6. Leave the field Internal/External at 0.
Import your private keys
1. Copy the list of generated private keys from the Derived Addresses section. Use
the controls below the list to show more rows or start at a certain index.
2. Import your private keys in a third-party wallet that supports this, such as
MyEtherWallet or Armory.
3. Set the field Internal/External to 1 to generate the private keys of your change
addresses.
4. Import the private keys associated with your change addresses in the third-party
wallet.
28