
Introducing our React Native SDK
See how our React Native SDK consolidates our existing packages into one solution for integrating embedded wallets and transaction automation.

Creating a passkey-enabled web app with Turnkey
In this post we’ll get into how you can set up a new NextJS project and use Turnkey to generate passkeys in the browser, and set them up as a user’s authentication method for wallets.

Our approach to multichain support at Turnkey
At Turnkey, we take a different approach than most to multichain support. Instead of adding individual chains on a case-by-case basis, our wallet infrastructure is built on cryptographic curves, so that new chains can be supported before they even launch. Here’s how that works.

Externally Owned Wallets (EOAs) vs. Smart Contract Wallets vs. Embedded Wallets
While browser extension wallets remain as the standard way to interface with onchain applications, the UX standard for what a great product experience entails has gotten much higher, prompting the development of account abstraction and wallet infrastructure tools to create traditional wallet alternatives.

Passkeys, passwords, and seed phrases: What's the difference?
Modern sign-in UX is broken. This goes for both traditional sign-in methods like passwords, which can be easily phished or hacked, to seed phrases for crypto wallets, which encounter similar issues. Passkeys offer a better alternative.

MPC, TEEs, and Account Abstraction: A guide to programmable wallets
Choosing the right wallet infrastructure is critical for crypto applications. Whether you’re launching a DeFi app, trading platform, or consumer-facing crypto wallet, your decision impacts security, UX, and scalability.

Announcing the Turnkey Whitepaper
Turnkey's whitepaper is live, offering a deep dive into our end-to-end verifiable computing system, built on battle-tested infrastructure securing millions of wallets.

QuorumOS is now open source
QuorumOS, the foundation of Turnkey's verifiable infrastructure, is now open source. This battle-tested operating system enables true end-to-end verifiable computing through secure enclaves and multi-party governance, proving that cryptographic verification at scale isn't just possible—it's already here.


.avif)
.avif)




