Control VET, VTHO and VeChain assets from one secure wallet
Keep ownership of your keys while managing network assets, dApps and transaction activity from a desktop environment built for regular use.
Keep control of VET, VTHO and VIP-180 tokens, inspect contract calls before signing, and connect to VeChainThor apps from a desktop wallet built for active asset operations.
Keep ownership of your keys while managing network assets, dApps and transaction activity from a desktop environment built for regular use.
Use wallet flows that fit treasury operations, shared approvals and safer signing policies for teams working with VeChain assets.
Readable transaction details, network context and checksum verification help reduce blind approvals and unsafe installs.
Use official wallet guides, developer resources and VeChainThor documentation when moving from holding assets to building or integrating apps.
Use the DMG build on macOS, the EXE installer on Windows, and the AppImage package on Linux. Each option follows the installation model users expect on that operating system.
A SHA-256 checksum lets you compare the downloaded file with the published release hash before installation. The current hashes are published in checksums.txt, so you can verify the installer before it becomes part of the trust path for private keys and signed transactions.
The page reads the operating system signal exposed by the browser and highlights the matching desktop build. The other builds remain available because teams often prepare installers for more than one environment.
Use the official VeChain website, VeChain documentation, wallet guides and developer resources linked from the Docs section. For asset operations, verify the domain and source before trusting any installation or recovery instructions.
Confirm the domain, inspect the download source, compare the checksum, and avoid entering a seed phrase into any page or application you did not intentionally install. Wallet security depends as much on distribution hygiene as it does on the wallet interface.
Open the DMG, move the application into Applications, then launch it from the Applications folder. If macOS shows a security prompt, verify the file source and checksum before overriding the prompt.
Download the EXE installer, run it from a trusted location, and follow the installer prompts. On managed machines, install from an account with the right permissions and keep the downloaded installer available for checksum review.
Download the AppImage, make it executable, and launch it as a desktop application. Most Linux desktops expose this through file properties; terminal users can apply executable permissions with chmod +x.
Wallet pages are common phishing targets because they sit close to private keys, balances and transaction approvals. Check HTTPS, spelling, redirects and official references before downloading or following recovery instructions.
Start with VeChainThor documentation and the developer resources linked in Docs. They cover the network model, APIs, SDKs and integration concepts needed before building wallet-connected applications.