See Phantom Secrets™ in action.
Three working reference implementations that demonstrate what Lokblok® hardware architecture delivers, covering personal cold storage through to institutional enterprise governance.
What These Demonstrators Are
Reference implementations. Not retail products.
Each Lokblok® wallet demonstrator is a working, fully functional reference implementation built on the Phantom Secrets™ SDK and Toughkey™ hardware. They ship with source code and exist to show financial institutions, security vendors, and device manufacturers exactly what the architecture can deliver.
They prove that institutional-grade digital asset security can be delivered without ever exposing private keys to software, networks, or cloud infrastructure: personal wallets, enterprise governance platforms, and everything in between.
Who Should Use These
Built for people making real decisions.
Technical Evaluators
Engineers and security architects evaluating Lokblok's SDK and hardware architecture. Use the demonstrators to see the cryptographic model in action before integrating.
Enterprise Decision-Makers
CFOs, CISOs, and treasury executives assessing how Lokblok's zero-custody model maps to their governance requirements and reduces institutional risk.
Product Teams
Teams building wallet products or digital asset platforms who need to understand what the Phantom Secrets™ SDK enables before committing to an architecture.
Audience: Designed for high-net-worth individuals, family offices, professional investors, and custody providers who need vault-grade security without a network connection.
Key Features
- Hardware-rooted MPC signing: threshold signatures executed entirely inside certified hardware security modules. Key shares never leave hardware.
- Air-gapped transaction workflow: wallet remains fully offline, QR codes are the only data crossing the air-gap boundary
- Multi-device approval: multiple Toughkeys™ must be physically present to authorise any transaction, no single device can act alone
- Secure Terminal™ environment: a secure workspace protecting data at rest with an application specific browser with whitelisted applications
- Flexible quorum models: configurable threshold policies such as 2-of-3 or 3-of-5
- Designed for Phantom Secrets™: no key material stored anywhere, at rest or in transit
Audience: Designed for high-net-worth individuals and active participants in digital asset markets who need institutional-grade security without sacrificing the speed and convenience of an online wallet.
Key Features
- Hardware-rooted MPC signing: threshold signatures executed entirely inside certified Toughkey™ HSMs
- Hot wallet convenience: connects directly to the blockchain, but is as secure as typical cold wallet storage
- Multi-device threshold approval: two physical Toughkeys™ must be present to authorise any transaction
- Secure Terminal™ environment: a secure workspace protecting data at rest with an application specific browser with whitelisted applications
- Configurable quorum models: default 2-of-3, configurable to 3-of-5, 4-of-7, or beyond
- Phantom Secrets™ architecture: no stored keys or key shares. Keys materialise only at the point of use inside hardware and are burned immediately.
Audience: Designed for banks, exchanges, asset managers, fintech platforms, corporate treasury teams, and tokenisation platforms that need secure digital asset management at scale with zero-custody cryptography.
Key Features
- Zero-cryptographic custody: transactions signed using Phantom Secrets™ MPC inside FIPS 140-3 Level 3 hardware, with no exposure of key material to software infrastructure
- Hierarchical signature policies: e.g. transactions under £10k: manager approval; over £100k: CFO approval required
- Segregation of duties: different key holder roles with distinct permissions and independent approval authorities prevent insider misuse
- Address whitelisting: restrict transfers to approved addresses only, with separate authorisation wallet for whitelist changes
- KYC-verified addresses: integrates with ToughID™ so only verified addresses can be added to the whitelist
- Multi-blockchain support: 8+ blockchains including Bitcoin, Ethereum, Avalanche, Solana, Polygon, Tron, Polkadot, and XRP, with new chains integrated in 1–4 weeks
How to Use These Resources
Watch. Download. Evaluate.
Watch the Demonstrators
Each embedded video above walks through the complete transaction workflow in real time, from device insertion to blockchain broadcast. Watch all three demonstrators live: Cold Wallet, Hot Wallet, and Business Wallet.
Want to see it in person? Contact us to arrange a live demonstration with a working device in hand.
Download the Data Sheets
Each demonstrator has a three-page sales information sheet covering the architecture, how it works, key features, and why it outperforms traditional approaches. Use these for internal evaluation, procurement conversations, or board-level presentations.
