# Demonstrators — Phantom Secrets™ in Action > Reference implementations, not retail products. Built for security architects, custody officers, and procurement teams who need to evaluate the technology against their own threat model. ## What These Demonstrators Are Working reference implementations of the Phantom Secrets™ protocol in selected use cases. They show concrete behaviour — key reconstruction, policy enforcement, ephemeral destruction — at the level of detail required to make a real procurement or architecture decision. They are not packaged products and they are not for resale. ## Who Should Use Them - Security architects validating the protocol against their threat model - Custody and treasury officers evaluating zero-custody operations - Procurement teams comparing Lokblok against incumbent HSM and MPC vendors - Government and regulated-entity reviewers performing technical due diligence ## How To Use Them Watch the recorded walkthroughs, download the reference materials, and request a hands-on session with a Lokblok engineer. Briefings are conducted under NDA. ## Related - Architecture: /api/md/architecture - Evaluate Lokblok: /api/md/evaluate - Contact: /api/md/contact