1990 BTC Forgotten Passphrase: Pakistani Investor's Failed Recovery Attempts (2013)
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
In November 2013, a BitcoinTalk forum user identified as 'Britman' disclosed a significant custody failure affecting 1990 BTC accumulated throughout 2012 at prices substantially below market value at the time of posting. By November 2013, when Bitcoin had appreciated sharply, the investor no longer possessed the passphrase required to access the wallet.dat file. The user estimated the locked holdings at approximately $2 million USD.
Britman undertook multiple technical recovery approaches over several months. These included attempts using pywallet software and brute-force password-cracking utilities, but none succeeded despite the user retaining a partial memory of the password structure. The geographic location (Pakistan) and limited access to industrial-grade computing resources constrained the feasibility of extended brute-force attacks.
Trust barriers prevented delegation to third parties. Britman expressed explicit concern about providing wallet.dat files to unknown individuals, citing realistic risks of theft or dishonesty. This distrust proved decisive: the user refused to share wallet files except in person, creating a practical impediment to remote assistance.
Unable to recover funds through technical channels and unwilling to transfer custody risk to intermediaries, Britman pivoted to a marketplace strategy. The user posted the inaccessible wallet for sale on the BitcoinTalk marketplace forum, soliciting the highest bid. A secondary incentive was offered: a 15% reward to any party capable of cracking the password without requiring access to wallet files or the computer itself.
The forum thread documents no successful outcome: no recorded sales, no password breaches, no third-party recoveries. The final disposition of the 1990 BTC—whether sold, recovered, or remaining permanently locked—remains undocumented.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2013 |
| Country | Pakistan |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate