See Phantom Secrets™ in action.

Three working reference implementations that demonstrate what Lokblok® hardware architecture delivers, covering personal cold storage through to institutional enterprise governance.

Reference implementations. Not retail products.

Each Lokblok® wallet demonstrator is a working, fully functional reference implementation built on the Phantom Secrets™ SDK and Toughkey™ hardware. They ship with source code and exist to show financial institutions, security vendors, and device manufacturers exactly what the architecture can deliver.

They prove that institutional-grade digital asset security can be delivered without ever exposing private keys to software, networks, or cloud infrastructure: personal wallets, enterprise governance platforms, and everything in between.

Built for people making real decisions.

Technical Evaluators

Engineers and security architects evaluating Lokblok's SDK and hardware architecture. Use the demonstrators to see the cryptographic model in action before integrating.

Enterprise Decision-Makers

CFOs, CISOs, and treasury executives assessing how Lokblok's zero-custody model maps to their governance requirements and reduces institutional risk.

Product Teams

Teams building wallet products or digital asset platforms who need to understand what the Phantom Secrets™ SDK enables before committing to an architecture.

Demonstrator 01

Personal Cold Wallet

Hardware-Rooted MPC | Air-Gapped Signing | Zero-Trust Execution

Air-gapped signing with hardware-rooted MPC.

Audience: Designed for high-net-worth individuals, family offices, professional investors, and custody providers who need vault-grade security without a network connection.

  • Hardware-rooted MPC signing: threshold signatures executed entirely inside certified hardware security modules. Key shares never leave hardware.
  • Air-gapped transaction workflow: wallet remains fully offline, QR codes are the only data crossing the air-gap boundary
  • Multi-device approval: multiple Toughkeys™ must be physically present to authorise any transaction, no single device can act alone
  • Secure Terminal™ environment: a secure workspace protecting data at rest with an application specific browser with whitelisted applications
  • Flexible quorum models: configurable threshold policies such as 2-of-3 or 3-of-5
  • Designed for Phantom Secrets™: no key material stored anywhere, at rest or in transit

Demonstrator 02

Personal Hot Wallet

Hardware-Rooted MPC | Online Signing | Zero Persistent Keys

Online convenience. Hardware security. Zero persistent keys.

Audience: Designed for high-net-worth individuals and active participants in digital asset markets who need institutional-grade security without sacrificing the speed and convenience of an online wallet.

  • Hardware-rooted MPC signing: threshold signatures executed entirely inside certified Toughkey™ HSMs
  • Hot wallet convenience: connects directly to the blockchain, but is as secure as typical cold wallet storage
  • Multi-device threshold approval: two physical Toughkeys™ must be present to authorise any transaction
  • Secure Terminal™ environment: a secure workspace protecting data at rest with an application specific browser with whitelisted applications
  • Configurable quorum models: default 2-of-3, configurable to 3-of-5, 4-of-7, or beyond
  • Phantom Secrets™ architecture: no stored keys or key shares. Keys materialise only at the point of use inside hardware and are burned immediately.

Demonstrator 03

Business Wallet

Institutional-Grade Digital Asset Infrastructure | Enterprise Governance | Compliance

Institutional digital asset infrastructure for enterprise governance.

Audience: Designed for banks, exchanges, asset managers, fintech platforms, corporate treasury teams, and tokenisation platforms that need secure digital asset management at scale with zero-custody cryptography.

  • Zero-cryptographic custody: transactions signed using Phantom Secrets™ MPC inside FIPS 140-3 Level 3 hardware, with no exposure of key material to software infrastructure
  • Hierarchical signature policies: e.g. transactions under £10k: manager approval; over £100k: CFO approval required
  • Segregation of duties: different key holder roles with distinct permissions and independent approval authorities prevent insider misuse
  • Address whitelisting: restrict transfers to approved addresses only, with separate authorisation wallet for whitelist changes
  • KYC-verified addresses: integrates with ToughID™ so only verified addresses can be added to the whitelist
  • Multi-blockchain support: 8+ blockchains including Bitcoin, Ethereum, Avalanche, Solana, Polygon, Tron, Polkadot, and XRP, with new chains integrated in 1–4 weeks

Watch. Download. Evaluate.

Watch the Demonstrators

Each embedded video above walks through the complete transaction workflow in real time, from device insertion to blockchain broadcast. Watch all three demonstrators live: Cold Wallet, Hot Wallet, and Business Wallet.

Want to see it in person? Contact us to arrange a live demonstration with a working device in hand.

Download the Data Sheets

Each demonstrator has a three-page sales information sheet covering the architecture, how it works, key features, and why it outperforms traditional approaches. Use these for internal evaluation, procurement conversations, or board-level presentations.

Ready to go deeper?

Arrange a live demonstration with working hardware, or explore the full technical architecture behind Phantom Secrets™.