Blockchain.info Hosted Wallet Lockout: Decryption Error and Recovery via Desktop Import
IndeterminateCustodial platform became inaccessible — whether funds were recovered is not documented.
In March 2013, a Blockchain.info user ('key2') encountered a critical access failure on the platform's hosted wallet service shortly after their first Bitcoin purchase. The user had been conducting transactions via Blockchain.info's web interface and Android application without incident.
On March 12, 2013, the Android app unexpectedly requested the private key to authorize a small outbound transfer—a requirement that had not appeared in previous transactions. Unfamiliar with wallet export procedures and having never saved the private key locally, the user was unable to complete the transaction. When attempting to send funds through the web version (which had two-factor authentication enabled), the user encountered output processing errors. Fearing account compromise, the user attempted to update their account's transaction authorization passwords and main account password.
Password change operations returned errors; the main password update appeared to succeed but immediately logged the user out. Subsequent login attempts produced a repeating pattern: brief access displaying the Bitcoin balance, followed by forced logout with an 'Error decrypting Wallet' message. The user opened a support ticket with Blockchain.info.
Recovery became possible when the user discovered a Google Drive backup of their wallet (wallet.aes.json file). Following guidance from community members 'Ditto' and 'psy' (Raoul Duke) on forum threads, the user downloaded the backup and imported it into Multibit, a desktop wallet application.
The import process required the new password the user had attempted to set during the failed password change operation. After successful import, the user addressed a missing dates error and initiated blockchain synchronization from the genesis block, later resetting the blockchain to March 13, 2009, to expedite recovery. Within approximately one hour, the blockchain was actively replaying from the reset point. The source documentation does not explicitly confirm final recovery status.
| Stress condition | Vendor lockout |
| Custody system | Exchange custody |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2013 |
| Country | unknown |
Why custodial Bitcoin fails differently than self-custody
Exchange custody transfers the custody problem from the holder to the institution. The holder no longer needs to manage seed phrases, maintain hardware, or understand cryptographic concepts. They need only to maintain their account. This simplicity has a cost: the holder no longer controls the private keys. Access depends entirely on the continued operational, financial, and regulatory health of the exchange.
Cases in this archive show that exchange failures cluster around specific event types: bankruptcy and insolvency, regulatory seizure, geographic sanctions, and account-level access failures (lost 2FA, forgotten email credentials). Each event type has a different recovery path and a different timeline. Bankruptcy proceedings typically take 6-24 months and produce partial recovery. Regulatory seizure timelines depend on legal process. Account access failures may be resolvable through platform support or may not.
The distinguishing feature of vendor lockout cases is that recovery — when it occurs — happens through processes the holder did not design and cannot control. They become claimants in a process rather than holders of an asset.
The primary protection against vendor lockout is not using a vendor for custody beyond what is needed operationally. Holdings intended to be stored long-term are most exposed to institutional risk. Exchange custody is well-suited for active trading and conversion; it is poorly suited for long-term storage of significant value. Moving Bitcoin off exchange into self-custody eliminates platform dependency at the cost of taking on personal custody responsibility.
Translate