Blog

Security

Lessons from Drift and Resolv: Off-chain trust assumptions and real world consequences

Off-chain trust assumptions, how they break under real-world conditions, and a new security model built on constrained, verifiable execution.

Resources
April 14, 2026

Introducing Enterprise Disaster Recovery: Infrastructure your assets can depend on

Enterprise Disaster Recovery with Turnkey gives teams a secure, auditable path to import wallets and restore full signing capability, without exposing key material at any point in the process.

Product
April 2, 2026

Featuring Encryption Key Storage with Turnkey

With Encryption Key Storage, teams can separate sensitive data from the keys that protect it and enforce exactly how and when those keys can be used.

Product
March 26, 2026

Yesterday never dies: Securing stateless systems against downgrade attacks

In this post, we’ll trace the evolution of Turnkey’s defense against downgrade attacks, exploring what worked, what didn’t, and what we learned along the way.

Developer
September 24, 2025

TLS sessions from within TEEs

How Turnkey runs applications in secure enclaves ("QuorumOS"), providing authentication and stable Quorum keys at boot.

Developer
August 19, 2024