Second Password Lost on Blockchain.info — 0.3 BTC Rendered Inaccessible
BlockedWallet passphrase could not be recalled or recovered — access was permanently blocked.
A Bitcoin holder maintained approximately 0.3 BTC on Blockchain.info, a popular web-based wallet service that was standard during the early-to-mid 2010s. The account employed a two-password authentication model: a primary password and a secondary password, both required to authorize any transaction. This architecture was intended to provide defense-in-depth against unauthorized access and wallet compromise.
The user had retained a written backup of the second password but discovered the credential no longer authenticated when attempting wallet access. The primary password remained functional, but without the secondary password, transaction authorization was impossible. No administrative recovery pathway was disclosed by Blockchain.info.
Recovery efforts escalated through multiple channels. The user contacted an external recovery service (walletrecoveryservices@gmail.com, operated by "Dave") to attempt brute-force decryption. The service reported trying at least 6 million password combinations based on user-provided hints, all unsuccessful. The user also engaged with Blockchain.info support directly and downloaded btcrecover, an open-source passphrase recovery tool. Using btcrecover's tier-2 password hash search function, the software enumerated 290.2 million candidate passwords with an estimated cracking time exceeding 7 days—beyond the user's configured computational threshold.
Common recovery variations were attempted manually: capitalization changes, number lock toggles, and passwords from memory. None succeeded. Forum commenters expressed skepticism about the external recovery service's legitimacy, and the user appeared to accept the loss as permanent, framing the 0.3 BTC (valued at approximately $75 at the time of posting) as acceptable collateral damage despite frustration at the situation.
| Stress condition | Passphrase unavailable |
| Custody system | Exchange custody |
| Outcome | Blocked |
| Documentation | Partial |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate