Keys without key risk.
Phantom Secrets™ eliminates stored secrets entirely. No keys at rest. No shares to steal. No recovery backdoors. Secrets are reconstructed only when needed, inside secure hardware, then destroyed immediately.

The Problem
Every security system fails at the same point: where secrets exist over time.
- Stored keys become attack targets
- Backups become liabilities
- Recovery introduces trust
- MPC shares can be accumulated
- Even "secure" systems still rely on something existing somewhere
The Phantom Secrets™ Model
Phantom Secrets™ replaces storage with ephemeral reconstruction.
Traditional approach
- Private keys stored
- Encrypted backups required
- Persistent key shares
- Custodial exposure
Phantom Secrets™ approach
- Public Regen Tokens stored (safe, useless on their own)
- A quorum of participants authorizes reconstruction
- The key is rebuilt inside secure hardware (Toughkey™)
- Used once, immediately destroyed
- The secret exists only at the moment of use
How It Works
From reconstruction to destruction in a single operation.
Regen Tokens Published
Public, non-sensitive tokens are stored. They are cryptographically useless without the quorum.
Conditions Evaluated
Identity is verified via ToughID™. Policy conditions are checked. Quorum threshold determined.
Quorum Convened
The required number of independent participants authorize the reconstruction event.
Key Reconstructed in Hardware
Inside certified secure hardware (Toughkey™), the key is mathematically reconstructed. It never leaves the secure element.
Operation & Destruction
The signing or decryption operation completes. The key is immediately destroyed. Nothing persists.
What Makes This Different
No persistent attack surface. No latent secret. No custody model.
No Persistent Attack Surface
There is nothing to steal at rest. The moment that creates all others, storing a key, is simply never performed.
No Latent Secret
No stored artifact reduces entropy or enables offline attack. Even if every Regen Token is compromised, the key cannot be reconstructed without the quorum.
No Custody Model
No one holds a key. Not even Lokblok®. Custody is replaced by quorum governance.
Threshold-Based Recovery
Flexible k-of-n threshold schemes. You define how many participants must agree. One compromised participant cannot act alone.
Hardware-Bound Execution
Toughkey™ certified secure enclave ensures the key is reconstructed in protected memory and never exposed to any software layer.
Policy-Controlled Access
Access requires conditions to be satisfied, not just possession of a credential. Cryptographic policy enforcement, not perimeter defense.
Comparison
Phantom Secrets™ vs. existing approaches
| Approach | Keys at Rest | Single Point of Failure | Stolen if Vault Breached | Ephemeral Keys |
|---|---|---|---|---|
| Cold Storage | ✓ | ✓ | ✓ | ✓ |
| HSM | ✓ | ✓ | ✓ | ✓ |
| MPC / TSS | Shares | Partial | Possible | ✓ |
| Password Manager / Vault | ✓ | ✓ | ✓ | ✓ |
| Phantom Secrets™ | ✗ | ✗ | ✗ | ✗ |
✓ = Vulnerability exists. ✗ = Not applicable / no vulnerability.

Phantom Secrets™ is the foundation.
Every other Lokblok® product builds on top of Phantom Secrets to deliver a complete zero-trust cryptographic architecture.




