What is Turnkey?
When you use a platform powered by Turnkey, your wallets and transactions are secured by the same technology trusted by leading teams apps like Bridge (a Stripe company), Polymarket, Moonshot, Alchemy, Magic Eden, World, and more.


















%202.png)
Security first
Turnkey was built to solve one problem above all: securing private keys. We designed a new, verifiable security model that ensures private keys are never exposed – not to us, not to the platform you’re using, and not to anyone else.
Non-custodial by design
You stay in control of your keys.
Hardware-isolated environments
All critical operations are executed within secure enclaves.
Learn moreVerifiable infrastructure
Independent proofs verify that every critical system is operating exactly as intended.
Learn moreExternal assurance
Formal assessments by accredited auditors provide ongoing validation of critical system correctness.
Embedded wallets
Automatically created and secured; no manual key management.
Flexible sign-in
Applications can enable access via email, phone, social accounts, biometrics, or connected wallets.
Multichain support
Compatible with all major chains.
Flexible access
Wallets can support shared access or co-ownership when needed.
%203.png)
Wallets made simple
Platforms that use Turnkey can instantly create secure wallets for every user, embedded directly in the apps you use. That means you can start sending, receiving, and storing crypto without complicated setups or seed phrases.
%202-1.png)
Smarter transactions
Turnkey also powers safe, automated transactions under the hood. Platforms can streamline onchain actions while keeping full security controls in place.
Seamless automation
No need to login or sign in every time you transact.
Built-in protection
Customizable policies help block suspicious or fraudulent activity.
Flexible approvals
High-value transactions can require multiple approvers.
Full audit trail
Every action is tracked for accountability.
%201.png)
Built for trust and proof
Today, millions of wallets are secured by Turnkey. The crypto platforms you use choose Turnkey because our security isn’t just trusted, it’s verifiable.
Every operation is protected and attested by hardware-backed enclaves, so platforms can prove how keys are managed and how actions are authorized. When you see that a platform is powered by Turnkey, you know your digital assets are protected by infrastructure that’s both trusted and provable.
Learn more about our verifiability roadmap here.
Frequently asked questions
Got any other questions?
Connect with our Support team on Slack
Turnkey is a third-party wallet infrastructure solution which is used to generate the in-app wallets used for signing. These wallets are not accessible to us, or to Turnkey. Signing onchain transactions with your in-app wallets requires explicit, cryptographic authentication using your personal authenticators, like a passkey. Secure key management through Turnkey allows us to offer a more seamless in-app experience compared to traditional wallets.
Turnkey uses AWS Nitro secure enclaves, a type of tamper-proof Trusted Execution Environment (TEE), for all sensitive operations. Private keys are never decrypted outside of these enclaves, and only you can authorize key usage with your credentials. Turnkey has also implemented stringent protocols to prevent individual engineers from altering enclave code, ensuring a secure end-to-end deployment process.
We work with Turnkey to provide secure, non-custodial in-app wallets. These wallets function much like traditional non-custodial wallets (e.g., Metamask, Rainbow), but remove the need to rely on phishable seed phrases, employ familiar authentication methods, and are more deeply embedded into our application for a seamless user experience.
Your wallet is secured by authenticators that only you control, ensuring you maintain self-custody while eliminating the risks associated with password-based security and providing an easier login experience.
No. Neither Turnkey or the platform using Turnkey’s infrastructure can access, transfer, or manage your assets. All sensitive wallet operations require your explicit authentication and all private key material stays encrypted within secure enclaves.
Traditional crypto wallets require you to store and protect a seed phrase - if it's lost or stolen, your assets can be too. Turnkey-powered wallets remove that risk by enabling users to authenticate via email, phone, biometrics, social logins, external wallets, and more. Plus users can regain access to lost wallets with email verification.
Turnkey's security model is verifiable through cryptographic attestations produced by its hardware enclaves. These attestations allow platforms and third parties to independently confirm that Turnkey’s infrastructure is operating securely and as intended.
Turnkey, as a principle, does not store any user authentication secret. Our authentication methods rely on public/private key cryptography. We store public keys only, and authentication happens with cryptographic signatures verified against them. To bridge traditional authentication protocols like email and OAuth to strong cryptographic key pairs we leverage Trusted Execution Environments (TEEs) to perform a key exchange.
