How Compliance Requirements Are Creating What They're Meant to Prevent
GENIUS & The Custody Paradox
The regulatory picture finally came into focus in March 2026. The SEC and CFTC issued joint interpretations under the GENIUS Act and CLARITY Act - frameworks that establish the first comprehensive U.S. regulatory structure for digital asset custody. Banking regulators rescinded guidance that previously discouraged crypto custody. The OCC approved five national trust bank charters specifically for digital asset services in December 2025. Agencies now require proof of custody infrastructure, asset segregation, and quarterly audits.
By Sue Pontius, Chief Executive Officer, Lokblok · Published 18 May 2026
For compliance officers, this looks like clarity. Finally, a framework. Finally, standards.
But there's a paradox buried in these requirements that most organizations haven't confronted yet.
**More Custody Doesn't Mean More Security
Every new custody requirement adds another layer of keys, escrow agents, and recovery mechanisms. Regulatory frameworks assume a model: distribute custody across multiple qualified entities, implement controls, audit the infrastructure. The logic is sound - no single point of failure, segregated responsibilities, third-party verification.
The problem is that this model treats keys as objects that must exist somewhere. The compliance answer is to split them, encrypt them, distribute them across custodians. More parties holding pieces. More hardware storing shards. More backup locations for recovery scenarios.
Each addition is meant to reduce risk. What it actually does is multiply the number of places a secret can leak.
**The Attack Surface Grows With Compliance
Consider what "qualified custody" looks like operationally. You need multiple custodians - that's multiple organizations with employees, infrastructure, and potential insider threats. You need recovery mechanisms - backup keys, encrypted shares, escrow arrangements. You need delegation workflows - CFO approval, compliance sign-off, sometimes external auditor verification.
All of this creates complexity. Complexity creates surface area. Surface area creates opportunity.
$3.1B was stolen in H1 2025 alone, including the $1.4B Bybit breach. 100% of major breaches involved key compromise. Not a failure of compliance. Not a lack of custody infrastructure. The keys existed somewhere, and attackers found them.
The regulatory frameworks don't prevent this. They formalize it. They require it.
**What Regulators Actually Want (And Don't Know How to Ask For)
Here's what the GENIUS Act and CLARITY Act are really demanding: proof that you can recover assets when needed, proof that no single party can act alone, proof that segregation exists between operational control and asset ownership, proof that the architecture can be audited.
None of these requirements - none - actually require that cryptographic secrets persist over time.
Regulators want accountability, auditability, and fail-safes. They don't want keys sitting in vaults. They just assume that's the only way to achieve the controls they're mandating.
The breakthrough isn't better custody. It's eliminating persistent custody entirely while still satisfying every regulatory requirement.
**Policy-Driven Cryptography Without Persistent Secrets
What if secrets reconstructed only at the moment of use, inside certified secure hardware (Toughkey), under strict policy conditions - identity verification, quorum approval, device attestation - then immediately destroyed?
No keys in vaults. No encrypted shares in cloud storage. No backup seeds. No persistent material that can be stolen, copied, or coerced.
Just policy enforcement. The CFO's biometric identity, plus compliance officer approval, plus device attestation. When all conditions are satisfied, the secret appears for exactly the duration of the signing operation, then disappears.
This satisfies segregation requirements - no single party can act alone. It satisfies recovery requirements - if the policy conditions can be met, access is possible. It satisfies audit requirements - every reconstruction event is logged and attributable.
It eliminates the attack surface regulators are trying to protect.
**The Question Compliance Officers Need to Ask
You're building infrastructure to meet the March 2026 requirements. You're evaluating custody providers. You're mapping delegation workflows to regulatory mandates.
Before you finalize that architecture, ask this: does your compliance solution require that secrets exist over time?
If the answer is yes, you're building exactly what attackers are looking for.
About the author
Sue Pontius
Chief Executive Officer, Lokblok
Sue Pontius is CEO of Lokblok, where she leads the company's work on zero-persistence cryptography for digital assets, identity, and high-assurance custody.
View LinkedIn profile →