Blog
Security

Introducing Enterprise Disaster Recovery: Infrastructure your assets can depend on
Enterprise Disaster Recovery with Turnkey gives teams a secure, auditable path to import wallets and restore full signing capability, without exposing key material at any point in the process.

Featuring Encryption Key Storage with Turnkey
With Encryption Key Storage, teams can separate sensitive data from the keys that protect it and enforce exactly how and when those keys can be used.
.png)
Yesterday never dies: Securing stateless systems against downgrade attacks
In this post, we’ll trace the evolution of Turnkey’s defense against downgrade attacks, exploring what worked, what didn’t, and what we learned along the way.
.png)
TLS sessions from within TEEs
How Turnkey runs applications in secure enclaves ("QuorumOS"), providing authentication and stable Quorum keys at boot.
