Encrypted Bitcoin Core wallet.dat (2015)—Passphrase Known, Recovery Failed
BlockedNo documentation described the custody setup — recovery without the owner's knowledge was not possible.
A Bitcoin Core user encrypted their wallet.dat file in 2015 using the application's built-in passphrase feature and made no further transactions after 2018. When attempting recovery years later, the user possessed the correct passphrase, multiple copies of wallet.dat stored across four separate physical locations, and access to the original Windows machine used for encryption—conditions that should have enabled straightforward recovery under normal circumstances.
Recovery attempts proceeded systematically through known approaches. The pywallet tool, a common offline wallet.dat decryption utility, returned the error "Couldn't open wallet.dat/main," indicating it could not parse the file structure. The user then attempted Bitcoin Core's native loadwallet CLI command with the -rescan flag, which returned error code -18: "Data is not in recognized format." Hex inspection of the file revealed data variation throughout (not uniform 0xFFFF patterns), suggesting selective corruption rather than complete file degradation, yet the file remained opaque to recovery utilities.
In an effort to restore compatibility, the user downgraded to Bitcoin Core version 12, the software version contemporary with the 2015 encryption. The legacy client also reported the wallet as corrupt and failed to extract usable key material. The user documented the incident on Reddit and solicited alternative recovery strategies from the technical community. No viable recovery method emerged from that discussion. The funds remain inaccessible despite the presence of all conventional recovery prerequisites: the correct passphrase, the original hardware platform, and persistent file copies.
| Stress condition | Documentation absent |
| Custody system | Software wallet |
| Outcome | Blocked |
| Documentation | Partial |
What the absence of documentation actually removes
What documentation provides is a starting point. Without it, heirs face three unknowns before they face any access problem: does the Bitcoin exist, where is it held, and what is needed to access it. Most of this information cannot be reconstructed after the owner dies or becomes incapacitated. Educated guesses, blockchain searches, and device inventories occasionally locate wallets — but without credentials, finding the wallet does not help.
Cases in this archive where documentation was absent but recovery succeeded typically involved one of two factors: an exchange account where the heir knew the email address and could navigate the account recovery process, or a designated person who had been given credentials informally and could act. Self-custody without any documentation or designated knowledge-holder is consistently the worst combination.
The content of documentation matters as much as its existence. A note that says "my Bitcoin is in a hardware wallet in the safe" is better than nothing but insufficient. Effective documentation specifies: what type of wallet, where the seed phrase is stored, whether a passphrase exists and where it is documented, and any exchange accounts and the email addresses used. It should be tested — the executor should be able to confirm the information is accurate before it is needed.
Documentation does not need to expose credentials to be useful. A document that describes the custody structure, points to where credentials are stored, and names a person who has been briefed can be stored without security risk. The goal is not to put the seed phrase in a filing cabinet — it is to ensure the executor has a map, not a blank wall.