Blog

Introducing Turnkey Verifiable Cloud (Private Beta)

Product
·
November 12, 2025
·
Bryce Ferguson, Co-Founder & CEO of Turnkey

We’re excited to announce that Turnkey Verifiable Cloud (TVC), a new platform designed to bring provable security to your most critical operations, is now in private beta. 

TVC lets you run trusted code inside secure, isolated, and verifiable infrastructure, leveraging the same guarantees that protect millions of Turnkey wallets today.

With Verifiable Cloud, you don’t just build secure systems, you build systems users can cryptographically verify.

From wallets to workflows: Bringing verifiability everywhere

Turnkey’s wallet infrastructure has long provided strong, verifiable security guarantees through:

  • Trusted Execution Environments (TEEs): Hardware-isolated enclaves that protect your code and data from outside access.
  • End-to-end reproducibility: Ensuring that your code runs deterministically, making it auditable and predictable.
  • Remote attestation: Letting users verify the exact code and environment executing their sensitive operations.

Turnkey Verifiable Cloud brings these same guarantees to any workflow. Critical operations like transaction processing, compliance workflows, and sensitive state management can now run in a fully verifiable, provably secure environment.

How TVC works

With Verifiable Cloud, you can:

Run operations inside hardware-isolated secure enclaves

Sensitive code runs in TEEs, keeping it isolated from operators, cloud infrastructure, and other software.

Provide cryptographic proof to users

Every computation produces verifiable evidence that the code executed as intended, in a known and trusted environment.

Launch quickly using Turnkey’s proven architecture

TVC inherits Turnkey’s battle-tested infrastructure, letting teams deploy verifiable applications without reinventing the wheel.

This isn’t just secure infrastructure, it’s provable security at scale. Whether you’re handling payments, compliance workflows, or other high-trust operations, TVC lets you show, not just say, that your systems are trustworthy.

Key use cases

Turnkey Verifiable Cloud supports a wide range of sensitive workflows depending on your infrastructure needs.

Anchorage Digital, a leading global crypto platform for innovators and investors, is an early beta customer using Turnkey Verifiable Cloud to build solutions for transaction visibility.

Some other common examples are:

1. Secure transaction and data processing

Run critical operations like transaction parsing, data transformations, and state updates inside verifiable enclaves, ensuring your outputs are cryptographically provable and auditable.

2. Proof of execution

Produce verifiable evidence that your code executed correctly, whether for smart contracts, workflow automation, or compliance checks. TVC ensures that every output can be trusted.

3. Oracles and attested data feeds

Provide verifiable, tamper-proof data to other systems. TVC allows teams to generate attested values for financial metrics, market data, or other sensitive information.

4. Privacy-preserving operations

Run sensitive logic, like key management, encrypted balances, multi-party computations, or verifiable execution of reproducible programs without exposing secrets to operators or external systems, maintaining privacy and integrity.

5. Complex, multi-step workflows

Coordinate multiple interdependent operations with verifiable guarantees at each step. TVC enables secure orchestration of distributed apps, multi-party computations, or trustless batching of transactions.

Provable security at scale

With Turnkey Verifiable Cloud, the principle of “don’t trust, verify” comes to cloud-native applications for the first time. TVC is designed to scale across complex workflows, letting organizations:

  • Handle sensitive data with confidence
  • Demonstrate regulatory and compliance guarantees
  • Launch verifiable applications without building enclaves from scratch

TVC is now in private beta, and we’re inviting teams building critical workflows, financial infrastructure, and verifiable applications to join our early access program.

Learn more and join the waitlist!

Related articles