GreenAddress User Locked Out by 2FA Requirement Despite Mnemonic Backup
ConstrainedCustodial platform became inaccessible — recovery ran through a lengthy institutional process.
A GreenAddress user transferred Bitcoin from Bitfinex to a GreenAddress multisig wallet, securing an encrypted backup of their recovery mnemonics using their Brazilian social security number as passphrase. Approximately one year later, the user lost both their laptop and cellphone. When attempting to access the wallet to make payments, the platform demanded Google 2FA verification. The user had never been prompted to set up 2FA during previous logins and possessed no record of their 2FA credentials after the phone loss.
Contacting GreenAddress support yielded no resolution. The platform's position was unambiguous: 2FA bypass would create unacceptable security risk and would not be permitted, regardless of user possession of encrypted mnemonics. GreenAddress acknowledged a critical design gap: the platform had not required users to register a recovery email address during signup, and its FAQ warned users about losing 2FA credentials without offering a mandatory recovery mechanism.
GreenAddress disclosed that it had implemented an nLocktime transaction recovery feature. If users lost all 2FA methods, the platform would generate a time-locked transaction allowing fund recovery after a specified nLocktime period (described as 24 hours). However, this mechanism required users to have accepted and retained the transaction prior to losing 2FA access—a requirement that was not clearly communicated during account creation.
The platform announced development of a new 2FA reset procedure scheduled for release within a month, acknowledging both technical and legal obstacles to implementation. The case illustrates a fundamental design failure: GreenAddress did not establish a mandatory, documented failsafe recovery path between mnemonic backup and 2FA enforcement, leaving users in a state where holding their seed was insufficient to recover their funds.
| Stress condition | Vendor lockout |
| Custody system | Collaborative custody |
| Outcome | Constrained |
| Documentation | Partial |
Why custodial Bitcoin fails differently than self-custody
Exchange custody transfers the custody problem from the holder to the institution. The holder no longer needs to manage seed phrases, maintain hardware, or understand cryptographic concepts. They need only to maintain their account. This simplicity has a cost: the holder no longer controls the private keys. Access depends entirely on the continued operational, financial, and regulatory health of the exchange.
Cases in this archive show that exchange failures cluster around specific event types: bankruptcy and insolvency, regulatory seizure, geographic sanctions, and account-level access failures (lost 2FA, forgotten email credentials). Each event type has a different recovery path and a different timeline. Bankruptcy proceedings typically take 6-24 months and produce partial recovery. Regulatory seizure timelines depend on legal process. Account access failures may be resolvable through platform support or may not.
The distinguishing feature of vendor lockout cases is that recovery — when it occurs — happens through processes the holder did not design and cannot control. They become claimants in a process rather than holders of an asset.
The primary protection against vendor lockout is not using a vendor for custody beyond what is needed operationally. Holdings intended to be stored long-term are most exposed to institutional risk. Exchange custody is well-suited for active trading and conversion; it is poorly suited for long-term storage of significant value. Moving Bitcoin off exchange into self-custody eliminates platform dependency at the cost of taking on personal custody responsibility.
Translate