Skip to main content

Our approach

Learn about Turnkey’s unique security framework

Non-custodial key management

Learn how Turnkey handles private keys

Secure enclaves

Overview of secure enclaves and how we use them

Quorum deployments

Learn how we deploy our secure applications

Verifiable data

Learn how we ensure an end-to-end audit trail

Disaster recovery

Turnkey’s disaster recovery process

Enclave secure channels

Learn about Turnkey’s enclave to end-user secure channels

The Turnkey Whitepaper

Read about Turnkey’s ambitious foundations with the Turnkey Whitepaper

Reporting a vulnerability

Overview of Turnkey’s responsible disclosure program