Forgotten Passphrase & Missing Recovery Phrase: 2013 Blockchain.info Wallet
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
In February 2021, a BitcoinTalk user identified as Dercie reported being locked out of a Blockchain.info wallet created in 2013. The user had preserved the wallet's encrypted AES.json export file but had lost the password protecting it.
When attempting recovery through Blockchain.com's wallet import feature, the password failed. The associated Blockchain account recovery path was also closed: the 12-word recovery phrase (mnemonic seed) had never been recorded or backed up at wallet creation. Dercie possessed only the wallet ID and the encrypted file itself—insufficient for any standard recovery pathway offered by the platform.
Community members including experienced users odolvlobo, malevolent, nrhs05, and The Cryptovator responded with pragmatic assessments: recovery required either the correct password or the mnemonic. Both were absent. The conversation pivoted to BTCRecover, an open-source Python-based brute-force tool capable of testing password candidates against encrypted wallet files. However, BTCRecover required technical prerequisites including Python 3.
8+, PyOpenCL, PyCryptoDome, and other dependencies—a non-trivial setup barrier. Dercie acknowledged having 'some clues' about password components but lacked the technical expertise to install and configure the tool properly. Community members attempted to guide installation in subsequent posts, correcting pip command syntax and dependency paths. The thread does not confirm whether Dercie ever successfully ran BTCRecover or recovered access.
The case exemplifies a widespread failure mode among early self-custody Bitcoin holders: reliance on a single encrypted wallet file with password-only protection, coupled with failure to record or back up the seed phrase at creation time.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2021 |
| Country | unknown |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.
Translate