Stefan Thomas and the IronKey Trap: 7,002 Bitcoin, 2 Attempts Left
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
Stefan Thomas, a programmer, received 7,002 BTC in 2011 as payment for creating an animated educational video about Bitcoin. He stored the private keys on an IronKey hard drive, a commercial encrypted storage device marketed for its military-grade security. IronKey's design includes a critical fail-safe: after 10 incorrect password attempts, the device automatically encrypts its contents irreversibly, rendering all data permanently inaccessible. Thomas recorded his passphrase on paper but subsequently lost that documentation.
Over the following decade, he made multiple password guessing attempts, exhausting 8 of his 10 allowed tries. By early 2021, when the case became public knowledge, Thomas retained only 2 remaining attempts—each guess carried the binary risk of either unlocking 7,002 BTC (worth approximately $206 million at that time) or losing access permanently. The irony was structural: the same mechanism that protected against external attackers made recovery from owner forgetfulness impossible. Technical commentators suggested potential workarounds, such as attempting to clone the physical drive's storage medium to bypass the authentication lock, but no documented resolution emerged.
The Chainalysis 2022 report estimated that approximately 3.7 million BTC (17.6% of the maximum supply) had become inaccessible through similar scenarios—lost passphrases, missing documentation, and device-dependent storage without recovery paths. At the time of public reporting, Thomas's Bitcoin remained in an indeterminate state: neither confirmed recovered nor formally abandoned.
| Stress condition | Passphrase unavailable |
| Custody system | Hardware wallet (single key) |
| Outcome | Indeterminate |
| Documentation | Partial |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate