Brad Yasar: Desktop-Mined Bitcoin Locked by Forgotten Passwords
BlockedWallet passphrase could not be recalled or recovered — access was permanently blocked.
Brad Yasar, a Los Angeles-based entrepreneur, mined Bitcoin on multiple desktop computers during the network's earliest years when mining was accessible to individual users with standard hardware. Over the years, he forgot the passwords to the wallets stored on those machines. By January 2021, when the New York Times documented the broader phenomenon of inaccessible Bitcoin fortunes, Yasar disclosed that he had spent hundreds of hours attempting password recovery across the affected computers. The drives collectively held thousands of Bitcoin—valued at hundreds of millions of dollars at 2021 prices—but remained locked behind passphrases that could not be recovered through conventional means.
Yasar did not publicly disclose the exact number of coins. With no pathway to recovery identified, he placed the hard drives in vacuum-sealed bags and removed them from daily view, stating that the reminder of his inaccessible wealth was psychologically painful. He characterized his current holdings as 'a fraction of what I could have.' No successful recovery has been reported in the years since the public disclosure.
The case exemplifies a category of early mining losses where technical accessibility existed but operational security documentation—specifically passphrase recording—was absent or lost.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Blocked |
| Documentation | Present and interpretable |
| Year observed | 2012 |
| Country | United States |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate