# Quantum Resistance > Algorithm-agile architecture. Because Phantom Secrets™ never stores keys, harvest-now-decrypt-later attacks find nothing to harvest. The cryptographic layer is algorithm-agnostic and can be upgraded from ECDH to post-quantum algorithms (NTRU, SABER, CRYSTALS-Kyber) without architectural redesign. ## Two Defences, Not One Lokblok provides two independent defences against quantum-era attacks: 1. **Nothing to harvest.** Harvest-now-decrypt-later attacks assume the attacker can capture today's encrypted material and decrypt it once quantum hardware is available. Phantom Secrets™ stores no private keys, so an adversary capturing every byte of every Lokblok-protected system today still has nothing to decrypt tomorrow. 2. **Algorithm agility.** When a primitive needs to be replaced (ECDH to a post-quantum KEM, ECDSA to a post-quantum signature scheme), the substitution happens at the cryptographic layer of the protocol. The threshold structure, hardware boundary, policy engine, and lifecycle do not change. There is no architectural rebuild. ## Practical Implication Lokblok customers do not need to choose between deploying today and being post-quantum-ready. They deploy today and the post-quantum upgrade path is built in. ## Related - Architecture: /api/md/architecture - Phantom Secrets™: /api/md/products/phantom-secrets