BitcoinTalk User RTQ1154 Locks 78 BTC Behind Mistyped Wallet Password
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
In June 2013, a BitcoinTalk forum user identifying as RTQ1154 posted in a community thread titled 'Let's add up the KNOWN lost bitcoins' describing a custody loss caused by a transcription error. RTQ1154 had encrypted their Bitcoin wallet with a passphrase but made a typing mistake during password entry, rendering the encrypted wallet file unopenable. The user possessed the wallet file itself and had some memory of the intended passphrase structure, but the exact sequence remained inaccessible.
At that time, Bitcoin desktop wallets were the primary self-custody mechanism for serious holders. Wallet encryption was implemented via BIP38 or client-side AES-256, with no recovery pathway once the passphrase was lost or corrupted. The 2013 forum environment had not yet developed sophisticated key derivation testing or brute-force assistance frameworks.
Community members responded with pragmatic suggestions: RTQ1154 might recover access if they could recall patterns in their password methodology, such as character set composition, length range, or whether certain characters were substituted. A BitcoinTalk user named Dentldir offered direct assistance via private message, suggesting some members had developed heuristic or computational approaches to password recovery.
The post pattern aligned with known cases of passphrase mistyping, including users 'ez1btc' and 'riX', indicating this was a recognized category of custody failure even in that era. No follow-up post from RTQ1154 documented whether recovery was attempted, succeeded, or abandoned. The 78 BTC represents approximately $4,700 USD at June 2013 market prices, a substantial sum but not unprecedented for early Bitcoin holders.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2013 |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate