Logo Logo By integrating state-of-the-art infrastructure, Vanish’s partnership with Turnkey ensures that every transaction is protected with cutting-edge security protocols. This integration protects user funds while enhancing the trading experience, ensuring a smooth and uninterrupted user-flow without compromising UX.
Turnkey utilizes Trusted Execution Environments (TEEs) to manage all sensitive cryptographic operations, such as key generation, encryption, and digital signing. These TEEs, often referred to as secure enclaves, are hardware protected zones that operate in complete isolation from the rest of the system.

These hardware protected zones have no persistent storage to retain data after processing, no external networking capabilities to interact with unauthorized systems, and no interactive access that could expose sensitive information. This design ensures private keys are never exposed to Vanish itself or put in a vulnerable state, as they remain securely within the enclave during any process.

Private keys, once created, are encrypted and stored securely. Access to these keys are tightly controlled, as they are only decrypted and utilized within the secure enclaves when explicitly authorized by the user to complete actions. This guarantees that at no point, raw private keys are visible or accessible to anyone, including TurnKey and Vanish systems.

Private key material is protected through military-grade encryption protocols, both while in storage and transit. The encryption process is entirely managed within the secure enclaves, ensuring absolute isolation of sensitive data. By confining all cryptographic processes within this secure boundary, TurnKey eliminates the possibility of raw keys being exposed or misused.

To learn more about Turnkey’s industry-leading infrastructure, visit their website.