CustodyStress
Archive › Seed phrase unavailable
Part of the CustodyStress archive of observed Bitcoin custody incidents
CS-01218

Hidden wallet discovered — hardware wallet (2024)

Survives
Case description
A 2024 estate case involved the family of a deceased Bitcoin holder who had used a paper wallet created in 2015. The wallet's public address was known—it appeared on the blockchain with a significant balance. The private key had been printed on paper and stored in a fireproof box. When the box was opened, it was found to contain a damaged paper wallet where approximately one-third of the private key characters were illegible due to ink bleed from water exposure. A recovery service was engaged. By systematically testing all plausible substitutions for the illegible characters, the correct private key was reconstructed after approximately 48 hours of computation.
Custody context
Stress conditionSeed phrase unavailable
Custody systemHardware wallet (single key)
OutcomeSurvives
DocumentationUnknown
Year observed2024
CountryInternational
Structural dependencies observed
Technical specialist required
Outcome interpretation
Access remained possible under the reported conditions.
Source
Privately Reported
Evidence type
News article
Related cases involving seed phrase unavailable
146 cases involve seed phrase unavailable 274 cases involve hardware wallet (single key) View archive statistics →
This archive documents observed custody survivability failures. It does not attempt to document all Bitcoin losses or security incidents. Submit a case
← All cases
Framework references
Terms guide
Survives
Access remained possible under the reported conditions.
Constrained
Access remained possible, but only with delay, dependence, or significant difficulty.
Blocked
Access was not possible under the reported conditions.
Indeterminate
There was not enough information to determine the outcome.
Single-person knowledge
Recovery depended on information or capability held by one individual who was unavailable.
Institutional dependence
Recovery depended on a third-party institution or service that was inaccessible or uncooperative.
Documentation gap
Recovery depended on instructions that were missing, incomplete, or unclear.
Authority mismatch
The person with legal authority to act did not have operational access, or vice versa.
Original text
Rate this translation
Your feedback will be used to help improve Google Translate