Security
.png)
Lessons from Drift and Resolv: Off-chain trust assumptions and real world consequences
Off-chain trust assumptions, how they break under real-world conditions, and a new security model built on constrained, verifiable execution.

Introducing Enterprise Disaster Recovery: Infrastructure your assets can depend on
Enterprise Disaster Recovery with Turnkey gives teams a secure, auditable path to import wallets and restore full signing capability, without exposing key material at any point in the process.

Featuring Encryption Key Storage with Turnkey
With Encryption Key Storage, teams can separate sensitive data from the keys that protect it and enforce exactly how and when those keys can be used.
.png)
Yesterday never dies: Securing stateless systems against downgrade attacks
In this post, we’ll trace the evolution of Turnkey’s defense against downgrade attacks, exploring what worked, what didn’t, and what we learned along the way.
.png)
TLS sessions from within TEEs
How Turnkey runs applications in secure enclaves ("QuorumOS"), providing authentication and stable Quorum keys at boot.
