Kristoffer Koch Recovers Forgotten 5,000 BTC Wallet After Four Years
SurvivedWallet passphrase was unavailable — a recovery path existed and access was restored.
In 2009, Kristoffer Koch, a Norwegian engineering student, purchased 5,000 Bitcoin for approximately 150 Norwegian kroner (roughly $27 USD at the time) as research material for a thesis on encryption. He stored the coins in a Bitcoin software wallet on his personal desktop computer, assigned a password, and then set the matter aside entirely. The wallet and its access credentials slipped completely from his memory over the following four years—a period during which Bitcoin remained obscure and nearly worthless to the wider public.
In October 2013, widespread media coverage of Bitcoin's rapid appreciation—from single digits to over $100 per coin—triggered Koch's recollection of his long-forgotten purchase. He located the old computer and, after considerable effort, managed to recall or reconstruct the password protecting the wallet. Access was successfully restored. At the time of recovery, his 5,000 coins were worth approximately $886,000. Koch converted roughly one-fifth of his holdings into Norwegian kroner, using the proceeds to purchase an apartment in the Toyen district of Oslo.
The case received significant press coverage in October 2013 from Norwegian state broadcaster NRK, The Guardian, phys.org, and numerous other outlets. It became one of the most widely-cited early examples demonstrating that forgotten Bitcoin could be successfully recovered and that early purchases—trivial in cost at the time of acquisition—could represent transformative wealth years later. The case illustrated both the custody risks of early Bitcoin adoption (lack of institutional framework, password dependency, device reliance) and the counterintuitive upside of long-term holding during Bitcoin's emergence from obscurity.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Survived |
| Documentation | Present and interpretable |
| Year observed | 2013 |
| Country | Norway |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate