Skip to main content
Glosso separates the wallet interface from the signing backend. Your agent code never changes when you switch modes — only the config does.
# Switch from sovereign to Privy with one command
glosso switch --mode privy
# Active wallet: EzwNi5jN2xTjaZRqAigXzKp4KyzcN8bXkwA1PHfckGo5

Comparison

SovereignPrivyTurnkey
Key storageLocal, AES-256-GCM encryptedPrivy TEE (Trusted Execution Environment)HSM via Turnkey API
External dependencyNonePrivy accountTurnkey account
Production ready✓ on trusted servers
ComplianceManualPrivy termsTurnkey terms
RecoveryYour encrypted mnemonicPrivy dashboardTurnkey dashboard
Best forDev, self-hosted, zero depsCloud productionEnterprise, compliance

Sovereign

Sovereign mode is fully self-contained. No accounts, no API keys, no external services.
The default mode. Glosso generates a BIP39 mnemonic, derives Solana HD wallet paths (m/44'/501'/index'/0'), and encrypts the mnemonic with AES-256-GCM before writing it to ~/.glosso/.env. Provision:
glosso provision --mode sovereign
# or on mainnet:
glosso provision --mode sovereign --network mainnet-beta
Key material flow:
BIP39 mnemonic (in-memory)

AES-256-GCM encrypt (PBKDF2 key from password + random salt + IV)

~/.glosso/.env  ←  GLOSSO_MASTER_SEED_ENCRYPTED=<hex>
                   GLOSSO_ENCRYPTION_PASSWORD=<password>
The plaintext mnemonic never touches disk. The encrypted blob is what’s stored. Sub-wallets (HD derivation): One seed, multiple addresses. Use the --index flag on CLI commands or the index parameter in SDK calls:
IndexConventional purpose
0Primary — main identity, receives funds
1Trading — DeFi operations, swaps
2Vault — long-term storage
3Burner — disposable, risky operations
When to use:
  • Development and testing on devnet
  • Self-hosted agents on a trusted server you control
  • Scenarios where zero external dependencies matter

Privy

Privy stores your keys in a Trusted Execution Environment (TEE) — a hardware-isolated enclave where even Privy’s own engineers cannot access key material. Provision:
glosso provision --mode privy
You’ll be prompted for your Privy API credentials, which are stored in ~/.glosso/.env. How it works:
Agent calls sign(tx)

@glosso/core → Privy REST API

Privy TEE signs the transaction

Signed tx returned — key never leaves enclave
When to use:
  • Production cloud deployments
  • When you want key management handled by a specialized provider
  • Teams that need key rotation, access controls, and audit logs from a provider

Turnkey

Turnkey provides HSM-backed (Hardware Security Module) key management with enterprise policy controls built into the infrastructure layer. Provision:
glosso provision --mode turnkey
When to use:
  • Enterprise deployments with compliance requirements
  • When you need hardware-grade key security guarantees
  • High-value production wallets
Turnkey integration requires a Turnkey account and API credentials. See Turnkey’s documentation for setup.

Switching Modes

Switching modes does not change your wallet address if you use the same underlying key material. Use glosso switch to activate any already-provisioned mode:
glosso switch --mode privy
To see all available (provisioned) modes:
glosso switch --list
Your agent code uses new GlossoWallet() — it reads GLOSSO_MODE from the environment and constructs the correct adapter automatically. No code changes needed when switching modes.