Turnkey home pagelight logodark logo
  • Login
  • Get Started
  • Get Started
Documentation
Solutions
SDK Reference
API Reference
Changelogs
  • Community
  • Blog
  • Contact Us
  • Documentation
    • Welcome
    • Getting Started
    • Concepts
    • Authentication
    • Wallets
    • Supported Networks
    • Developer Reference
    • Security
      • Overview
      • Our Approach
      • Non-Custodial Key Management
      • Secure Enclaves
      • Quorum Deployments
      • Verifiable Data
      • Disaster Recovery
      • Enclave Secure Channels
      • The Turnkey Whitepaper
      • Reporting a Vulnerability
    • FAQ
    Security

    Security

    Learn how Turnkey achieves innovative, cloud scale, no single point of failure security.

    Our approach

    Learn about Turnkey’s unique security framework

    Non-custodial key management

    Learn how Turnkey handles private keys

    Secure enclaves

    Overview of secure enclaves and how we use them

    Quorum deployments

    Learn how we deploy our secure applications

    Verifiable data

    Learn how we ensure an end-to-end audit trail

    Disaster recovery

    Turnkey’s disaster recovery process

    Enclave secure channels

    Learn about Turnkey’s enclave to end-user secure channels

    The Turnkey Whitepaper

    Read about Turnkey’s ambitious foundations with the Turnkey Whitepaper

    Reporting a vulnerability

    Overview of Turnkey’s responsible disclosure program

    Was this page helpful?

    Activity WebhooksOur Approach
    xgithubslacklinkedin
    Powered by Mintlify
    Assistant
    Responses are generated using AI and may contain mistakes.