Now, with TVC, developers can build systems that they can cryptographically verify. See how this is a must-have in securing critical infrastructure.
Turnkey has always been at the forefront of wallet infrastructure innovation. Now, we're taking another industry-first step with IndexedDB integration.
This guide breaks down the key components of a stablecoin payments stack and how teams can navigate common challenges to launch faster and more securely.
Comprehensive support for TRON policies and parsing is now live on Turnkey!
We’ve now added full support for EIP-4844 and EIP-7702, which include two new transactions (Type 3 and Type 4) to upgrade the core Ethereum protocol.
We’re excited to introduce SMS authentication – empowering developers with more control over their embedded wallet onboarding flows.
Turnkey's whitepaper is live, offering a deep dive into our end-to-end verifiable computing system, built on battle-tested infrastructure securing millions of wallets.
Turnkey has added support for swap integrations with 0x and Jupiter, helping developers add in-app token swaps faster and more securely, plus support for cross-chain transfers using Li.Fi.
Explore the authentication options available to developers building with Turnkey and see how each one of them can deliver a more seamless and secure user experience.
This roadmap shows a concrete path toward complete, end-to-end verification of everything that happens on Turnkey.
Five strategies that elevate web3 wallet UX and how Turnkey’s wallet infrastructure makes them possible.
Turnkey now provides visible proof that wallet creation happened securely inside isolated enclaves, fully auditable, verifiable, and visible to your users.
Learn why stablecoins can’t just rely on smart contracts alone for security and how Turnkey protects transactions with enclave-enforced policies.
How Turnkey provides a secure execution layer for account abstraction wallets, enforces security rules, and ensures every operation is verifiable.
Challenges of key management, the main schemes used when building secure key management infrastructure, and how Turnkey differs from the competition.