Blockchain.info Wallet Access Lost After SD Card Automatic Format During Device Migration
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
In June 2016, a Blockchain.info user with the handle 'Graver' lost access to their Bitcoin holdings following a device migration that exposed the fragility of single-factor app-based custody. The user had been accessing their Blockchain wallet via a PIN code on an older mobile phone, with the wallet application installed on the device's SD card rather than internal storage. When upgrading to a new device, the user removed the SD card from the old phone and inserted it into the new one, expecting the wallet app and its data to migrate seamlessly. During the new phone's initial setup, however, the device automatically formatted the SD card as part of its standard initialization routine. This action rendered the wallet app inaccessible and severed the user's only operational pathway to their funds.
With app access lost, the user discovered that their recorded password no longer functioned. The single mnemonic phrase they had written down also proved incorrect when tested. Blockchain.info's support team could only offer to disable Two-Factor Authentication—a step that did not restore wallet access. The user then attempted to use btcrecover, a third-party password recovery tool designed to brute-force wallet backup files (wallet.aes.json). However, the tool's computational constraints proved insurmountable: with an 8–11 character password combining numbers, uppercase, and lowercase letters, btcrecover estimated over 13 billion possible combinations and projected an ETA exceeding 168 hours, both exceeding the tool's built-in limits. By late June 2016, the user had confirmed btcrecover's basic functionality through testing with smaller character sets but remained unable to solve the full password. The user explored whether the mnemonic phrase could be reconstructed through wordlist analysis, suspecting transcription errors in their original written record. The forum thread provides no final resolution, asset amount, or confirmation of whether access was ever restored.
| Stress condition | Passphrase unavailable |
| Custody system | Exchange custody |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2016 |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate