Blockchain.info 2013–2014 Wallet Access Failure: Encrypted Files, Lost Password, Functional Recovery Phrase
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
User 'marvin42' created Bitcoin wallets via blockchain.info in 2013 or 2014 and retained two AES-encrypted backup files dated 28 February 2014 and 22 April 2013. The wallet address and holdings remain visible and unmoved on the blockchain, confirming funds exist. The user possesses an 11-word recovery phrase—non-standard for the pre-BIP39 era when blockchain.
info employed custom word lists and variable seed lengths—but cannot recall the account password. Attempts to use blockchain.info's legacy password recovery tool at https://login.blockchain.
com/beta/legacy-pages/forgot-password.html triggered a JavaScript error: 'TypeError: Cannot read properties of undefined (reading 'toLowerCase')'. The import-wallet page similarly rejected the 11-word phrase. A parallel case, user '546876B', reported Bitcoin purchased via blockchain.
info in November 2013, with only the AES-JSON file retained and password forgotten. Brute-force decryption using btcrecover.py across billions of password candidates yielded no success. Expert respondent 'nc50lc' confirmed the website errors do not necessarily indicate corrupted backups and suggested the account password could theoretically be derived from the 11-word recovery phrase using blockchain.
info's 'My Wallet Backup Decryption Tool' (GitHub: blockchain/my-wallet-backup-decryption-tool). The documented workflow involves: decrypt the AES-JSON file with the recovered password, extract private keys in BASE58 format, convert to WIF, and import to cold storage via Electrum. The critical bottleneck remains password recovery; website tooling remains non-functional as of the forum documentation date (December 2024).
| Stress condition | Passphrase unavailable |
| Custody system | Exchange custody |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2013 |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate