Stefan Thomas: 7,002 Bitcoin on IronKey S200, Passphrase Lost, 2 Attempts Remaining
BlockedWallet passphrase could not be recalled or recovered — access was permanently blocked.
Stefan Thomas possessed an IronKey S200 USB drive containing the private keys to 7,002 Bitcoin, worth approximately $235 million at the time of public reporting. The drive had been encrypted with a passphrase that Thomas could no longer recall. The IronKey S200, developed in cooperation with the U.S. Department of Homeland Security, incorporates a security feature that permanently erases all contents after ten unsuccessful password attempts. Thomas had already exhausted eight attempts, leaving only two remaining before the drive's self-destruct mechanism would activate irreversibly.
The security architecture that rendered the drive inaccessible presented a technical vulnerability. The specialist firm Unciphered identified a hardware-level flaw in the IronKey S200's design that would allow them to bypass the attempted-password counter, enabling brute-force password recovery within days. Unciphered demonstrated this capability repeatedly to Wired magazine on identical hardware.
Thomas declined Unciphered's offer of professional recovery. According to available accounts, he had engaged two other recovery teams on an unpaid basis, though neither had made measurable progress over more than a year. Thomas's reluctance to pursue professional recovery was attributed to two factors: he was already a multi-millionaire through other means, and the emotional or financial pressure surrounding $235 million in inaccessible Bitcoin did not appear to motivate action.
This case illustrates a specific custody failure mode: the passphrase-protected encrypted file, where the encryption's strength prevents not only unauthorized access but also authorized recovery when the holder forgets the key. The drive's hardware-enforced destruction mechanism converted a technically recoverable problem into a permanent loss.
| Stress condition | Passphrase unavailable |
| Custody system | Hardware wallet with passphrase |
| Outcome | Blocked |
| Documentation | Present and interpretable |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate