Getting Started with Exódus® Web3 Wallet — Exódus® Browser

Install, secure, and use the Exódus® Browser extension to interact with dApps and manage tokens

This guide introduces the Exódus® Web3 Wallet (Exódus® Browser extension), showing how to install the extension, create or restore a wallet, secure your recovery seed, connect to decentralized apps (dApps), and follow essential privacy and safety practices.

Before you begin

Tip: if in doubt, visit the official Exódus® website and follow the download links there. Verify domain spelling and HTTPS before installing.

Installing the Exódus® Browser extension

  1. Open your browser's extension/add-on store (Chrome Web Store, Firefox Add-ons, Edge Add-ons, etc.).
  2. Search for "Exódus® Wallet" or navigate from the official site and click "Add to browser".
  3. Review requested permissions — typical permissions include access to connect to websites and read site data for transaction signing.
  4. After installation, pin the extension to your toolbar and open it to start setup.

Create or restore a wallet

On first run, choose whether to create a new wallet or restore from an existing recovery seed.

Important: the recovery seed is the only way to restore funds if your device or browser profile is lost. Never share it.

Basic wallet operations

Security & privacy best practices

If you receive an unsolicited signature request, do not approve it. Attackers sometimes use approvals to drain tokens via smart contracts.

Demo: Connect to a dApp (illustrative)

This is a static demo panel to show a typical connection flow. Do not enter real secrets here.

Troubleshooting & support

For official support and downloads, always use links from the Exódus® official site. Beware of clone sites and phishing channels.

Disclaimer

Disclaimer: This guide is for informational purposes only and is not financial, legal, or tax advice. Always download wallet software from official sources. Never share your recovery seed or private keys. The authors are not responsible for losses resulting from misuse, compromised devices, or phishing attacks.