
What are embedded wallets in crypto?
Find out what embedded wallets are, how they work, and how to integrate them into your project as a crypto app developer

Introducing OAuth on Turnkey
OAuth is now live on Turnkey! Turnkey enables dramatically better crypto UX by allowing innovative teams like Infinex, Bullpen, Utopia, Alchemy, and Thunder Terminal to create secure non-custodial wallets for their users.
.png)
TLS sessions from within TEEs
How Turnkey runs applications in secure enclaves ("QuorumOS"), providing authentication and stable Quorum keys at boot.

Our React, JavaScript, & Swift SDKs are live
As a developer, creating your own non-custodial wallet infrastructure from scratch is as difficult as it gets. Turnkey’s mission is to make this process as smooth as possible, so that you can focus on building your product, and be confident in your application’s wallet architecture from day one.

Announcing Turnkey’s $15M Series A
Let’s be honest — crypto is still too hard to use. Before a user can do anything onchain, they have to jump through a series of hoops: download a browser extension, write down their seed phrase, and figure out how to approve a transaction for the first time. And because this happens before users even touch your product, it’s nearly impossible to get them to stay if something goes wrong.

You can now import private keys to Turnkey
Turnkey’s wallet infrastructure enables teams to embed non-custodial wallets right into their crypto applications. However, millions of crypto users and businesses already have existing wallets. To ensure that users and developers can seamlessly transition to wallets powered by Turnkey, we’ve launched our Import feature, which is now live!

Introducing secure email authentication on Turnkey
Stepping into crypto for the first time can be a confusing experience. Seed phrases, browser extensions, confusing terminology… these things are not compatible with a great onboarding experience in general, and even worse they are completely unfamiliar to a new crypto user. Developers building consumer applications on Turnkey have been clear: they want a simpler approach.

How we built secure email recovery using TEEs
In building crypto products, balancing trade-offs between user accessibility and security is a constant challenge. Developers building wallets for end users are very familiar with this dilemma. To help fill this gap, Turnkey added support for passkeys as an authenticator; many developers building on Turnkey have opted to implement passkeys as the primary authentication method because they’re quick to use, secure, and generally easy to recover.


.avif)
.avif)




