Turnkey home page
Search...
⌘K
Ask AI
Demo
Login
Get Started
Get Started
Search...
Navigation
Architecture
Secure Hardware
Documentation
SDK Reference
API Reference
Security
Changelogs
Support
Blog
Contact Us
Get Started
Overview
Concepts
Architecture
QuorumOS
Remote Attestation
Secure Hardware
CLI
Account Setup
Quickstarts
Production Checklist
Products
Embedded Wallets
Transaction Automation
Crypto Ecosystems
Overview
Supported Networks
Developers
Examples
Using LLMs
API Overview
Policies
FAQ
Architecture
Secure Hardware
Copy page
Copy page
Secure hardware provides strong isolation and attestation for sensitive operations:
Hardware-enforced isolation: secure enclaves have no external networking or persistent storage.
Root quorum: use ≥3 members with threshold ≥2; each critical user should set up multiple authenticators (e.g., Touch ID, YubiKey).
Store API keys securely in hardware security modules (HSMs) or encrypted vaults; never hard-code keys in code or client-side.
Use HPKE-based secure channels for enclave ↔ end-user communication.
Leverages hardware root-of-trust modules (e.g., AWS Nitro Security Module) for cryptographic attestation.
Was this page helpful?
Yes
No
Remote Attestation
CLI
Assistant
Responses are generated using AI and may contain mistakes.