131 BTC Inaccessible: Forgotten Wallet Password, No Recovery Mechanism
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
In December 2018, a BitcoinTalk user known as 'jackang' posted a public plea for help recovering access to a wallet containing 131 BTC. The wallet had been created years earlier when Bitcoin was inexpensive, protected by a password set 'at random.' The holder had not documented the passphrase and retained no recovery mechanism.
When jackang decided to liquidate the position, they discovered the password was inaccessible to memory. They could recall only fragments: the passphrase was 8–9 characters long, contained numbers and letters, and included their own name. The wallet itself (wallet.dat file) remained functional and secure; the barrier was entirely the absence of the access credential.
Jackang published three associated Bitcoin addresses and offered a 10 BTC reward (approximately $66,000 USD at December 2018 rates) to anyone who could unlock the wallet. Community members suggested brute-force password recovery tools such as JohnTheRipper, consultation with professional recovery services, and attempts to reconstruct the passphrase through memory of personal password patterns from 2009. One experienced community member, LoyceV, warned against sharing the wallet.dat file with untrusted third parties, noting the high risk of theft by scammers.
Jackang acknowledged receiving private solicitations but declined to transmit the wallet file to unvetted services. The thread did not document a final outcome. There is no public record of whether jackang ultimately recovered access through password reconstruction, retained a professional recovery service, or accepted permanent loss of the 131 BTC. The incident exemplifies pure user error: a functional custody system defeated by absent documentation and a single-point-of-failure passphrase dependency.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2018 |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.