Resources

How Turnkey + BAM bring end-to-end verifiability to Solana
Learn why verifiability matters on Solana and how BAM and Turnkey can work together to make every transaction auditable and provably secure.
.avif)
Turnkey x Hyperliquid: Powering secure EIP-712 signing
Learn through policy examples and real projects using Turnkey how to have powerful, policy-enforced control over automation, execution, and account security when building on Hyperliquid.

How privacy and verified security win enterprise trust
Explore how privacy and verifiable security can work together to make public blockchains viable for enterprise use.
.avif)
Simplify authentication: Social, SMS, and passkeys in web3
Explore the authentication options available to developers building with Turnkey and see how each one of them can deliver a more seamless and secure user experience.
.avif)
5 crypto wallet design strategies to improve UX
Five strategies that elevate web3 wallet UX and how Turnkey’s wallet infrastructure makes them possible.

Bulletproofing stablecoin payments with Turnkey
Learn why stablecoins can’t just rely on smart contracts alone for security and how Turnkey protects transactions with enclave-enforced policies.

What are account abstraction crypto wallets?
How Turnkey provides a secure execution layer for account abstraction wallets, enforces security rules, and ensures every operation is verifiable.

Wallet provider key management (and Turnkey’s approach)
Challenges of key management, the main schemes used when building secure key management infrastructure, and how Turnkey differs from the competition.
