Security & Architecture
Learn how Turnkey achieves innovative, cloud scale, no single point of failure security.
Turnkey is the first verifiable key management system of its kind, securing millions of wallets and private keys for a wide variety of use cases. Turnkey’s security architecture ensures that raw private keys are never exposed to Turnkey, your software, or your team. We provide end-to-end private key generation and access control within secure enclaves, with strong isolation guarantees and cryptographic attestation proving that only authorized code is running. Our custom-built operating system, QuorumOS, minimizes attack surface and enables reproducible, auditable deployments. From hardware-backed trust to multi-factor access controls, every layer of Turnkey’s architecture is designed to be secure, verifiable, and developer-friendly by default. Our whitepaper covers our holistic security model in-depth, and speaks to our vision for building verifiable key management infrastructure. Learn more about our approach to security here.
Our approach
Learn about Turnkey’s unique security framework
Non-custodial key management
Learn how Turnkey handles private keys
Secure enclaves
Overview of secure enclaves and how we use them
Quorum deployments
Learn how we deploy our secure applications
Verifiable data
Learn how we ensure an end-to-end audit trail
Disaster recovery
Turnkey’s disaster recovery process
Enclave secure channels
Learn about Turnkey’s enclave to end-user secure channels
The Turnkey Whitepaper
Read about Turnkey’s ambitious foundations with the Turnkey Whitepaper
Reporting a vulnerability
Overview of Turnkey’s responsible disclosure program