The moment keys are needed most… they're gone.

Digital assets don't disappear at death. Access does. Lokblok® resolves the fundamental paradox of digital inheritance: ownership during life and access at death, without ever storing the key.

Digital wealth has outpaced the systems designed to manage it.

Private keys are held solely by the individual. No one else has access. And no safe way exists to share them. This creates a brutal trade-off with no good answer.

Option 1

Share the keys

  • Lose control during life
  • Create theft and misuse risk
  • Expose sovereignty prematurely

Option 2

Keep them private

  • Assets become inaccessible at death
  • Families lose everything
  • No mechanism for recovery

The industry workarounds. They are all terrible.

Each introduces new risks that make the problem worse, not better.

Writing seed phrases down

Theft or physical loss

Storing keys in vaults

Custody liability

Sharing credentials with family

Loss of sovereignty

Using custodians

Counterparty exposure

Traditional estate frameworks assume assets can be accessed by institutions, that executors can retrieve accounts, and that legal authority enables control. None of that applies to digital assets. Platforms cannot override keys. Trustees cannot access wallets. Legal authority ≠ technical access.

Ownership during life.
Access at death.

Lokblok removes the trade-off entirely. Using Phantom Secrets™, the original key is never stored. It is transformed into distributed cryptographic commitments. No single party holds access. No recovery material exists.

The original key is never stored
Transformed into distributed cryptographic commitments
No single party holds access
No recovery material exists anywhere
Key reconstructed only at the moment of use
Only when defined conditions are met
Only inside secure hardware

How It Works

1

Client defines control

Chooses Recovery Agents (people or devices), defines threshold (e.g. 3 of 5), and appoints a trustee or executor.

2

Key is transformed

No storage. No backup. No escrow. The original key is cryptographically dissolved. It cannot be reconstructed by anyone before conditions are met.

3

Pre-authorised transfer on death

The client defines beneficiaries, asset distribution, and trustee authority, all cryptographically signed in advance.

4

Death event is verified

Biometric and multi-source verification via ToughID™. Prevents false or premature triggers. No one can claim access early.

5

Reconstruction & transfer

Recovery Agent quorum participates. Key is reconstructed inside secure hardware. Trustee becomes the legitimate owner. No Recovery Agent ever sees the key.

Every problem. Resolved at the root.

No loss of assets

Keys are recoverable when needed

The key can be reconstructed by the correct quorum when conditions are met. Assets are never permanently inaccessible.

No exposure during life

No one holds access prematurely

Nothing exists that can be stolen, compelled, or subpoenaed before the defined conditions are met.

No custody liability

Trustees never hold keys before death

Institutions can offer inheritance services without ever taking custody of assets. No counterparty risk during the client's lifetime.

No manual workarounds

No seed phrases, no unsafe storage

Every step is cryptographically signed, automated, and court-defensible. No reliance on informal processes or physical backups.

From ownership to transfer, with no exposure at any stage.

01

During Lifetime

  • Full ownership retained
  • No external access
  • Key cannot be reconstructed by anyone

02

Incapacity

  • Power of Attorney workflows
  • Recovery without device access
  • Quorum and hardware verification required

03

At Death

  • Verified, automated transfer
  • Death cryptographically attested
  • Trustee gains legal and technical control

04

Post-Transfer

  • Assets distributed to beneficiaries
  • Beneficiaries onboarded
  • Immutable court-defensible audit trail

The infrastructure for a new asset class of client.

Trust Companies & Fiduciaries

  • No custody risk during client's lifetime
  • Executable estate workflows
  • Court-defensible cryptographic audit trail

Family Offices

  • Multi-generational asset visibility
  • Structured inheritance planning
  • No reliance on informal or manual processes

Wealth Managers

  • Retain client relationships across generations
  • Integrate digital assets into estate planning
  • Compliant with succession law frameworks

Regulatory & Legal Alignment

Compatible with succession law frameworks · Supports fiduciary obligations · Provides immutable audit trails · Every action is cryptographically signed, verifiable, and court-defensible.

Every current model stores something.

ModelProblem
Seed phrase storage
Theft or physical loss
Custodial solutions
Loss of sovereignty
Password managers
Single point of failure
Manual processes
Unreliable, non-compliant
Lokblok®
No stored keys.
No premature access.
No irreversible loss.

Digital inheritance has always been a paradox.

You must both share the key…
and never share it.

Lokblok resolves it:

The key is never shared.
Only the conditions under which it can exist.

For the first time:

Ownership and inheritance can both be true
Institutions can offer digital estate services without custody risk
Families receive assets without anyone holding premature access

Five products. One connected architecture.

For the first time

Ownership and inheritance can both be true.

The key is never shared. Only the conditions under which it can exist.

Explore Inheritance WorkflowsSee Trustee Integration →