Turnkey home pagelight logodark logo
  • Login
  • Get Started
  • Get Started
Documentation
Solutions
SDK Reference
API Reference
Changelogs
Security

Security

Learn how Turnkey achieves innovative, cloud scale, no single point of failure security.

Our approach

Learn about Turnkey’s unique security framework

Non-custodial key management

Learn how Turnkey handles private keys

Secure enclaves

Overview of secure enclaves and how we use them

Quorum deployments

Learn how we deploy our secure applications

Verifiable data

Learn how we ensure an end-to-end audit trail

Disaster recovery

Turnkey’s disaster recovery process

Enclave secure channels

Learn about Turnkey’s enclave to end-user secure channels

The Turnkey Whitepaper

Read about Turnkey’s ambitious foundations with the Turnkey Whitepaper

Reporting a vulnerability

Overview of Turnkey’s responsible disclosure program

Assistant
Responses are generated using AI and may contain mistakes.

Was this page helpful?

Activity WebhooksOur Approach
xgithubslacklinkedin
Powered by Mintlify
  • Community
  • Blog
  • Contact Us
  • Documentation
    • Welcome
    • Getting Started
    • Concepts
    • Authentication
    • Wallets
    • Supported Networks
    • Developer Reference
    • Security
      • Overview
      • Our Approach
      • Non-Custodial Key Management
      • Secure Enclaves
      • Quorum Deployments
      • Verifiable Data
      • Disaster Recovery
      • Enclave Secure Channels
      • The Turnkey Whitepaper
      • Reporting a Vulnerability
    • FAQ
    Security

    Security

    Learn how Turnkey achieves innovative, cloud scale, no single point of failure security.

    Our approach

    Learn about Turnkey’s unique security framework

    Non-custodial key management

    Learn how Turnkey handles private keys

    Secure enclaves

    Overview of secure enclaves and how we use them

    Quorum deployments

    Learn how we deploy our secure applications

    Verifiable data

    Learn how we ensure an end-to-end audit trail

    Disaster recovery

    Turnkey’s disaster recovery process

    Enclave secure channels

    Learn about Turnkey’s enclave to end-user secure channels

    The Turnkey Whitepaper

    Read about Turnkey’s ambitious foundations with the Turnkey Whitepaper

    Reporting a vulnerability

    Overview of Turnkey’s responsible disclosure program

    Assistant
    Responses are generated using AI and may contain mistakes.

    Was this page helpful?

    Activity WebhooksOur Approach
    xgithubslacklinkedin
    Powered by Mintlify