Anthropic’s Claude AI was fed an old mnemonic phrase and a decade‑old hard‑drive dump, then spent eight weeks piecing together clues to recover the third password for a 2015 Bitcoin wallet now worth nearly $400,000.
Claude Helps Forgetful Stoner Recover $400k Bitcoin Wallet After 11‑Year Password Hunt

When “cprkrn”—a pseudonymous Reddit user who describes himself as a “stoner‑investor”—first bought five Bitcoins in 2015, he stored the private keys in a Blockchain.com wallet protected by a three‑part password. Two parts survived in a handwritten note; the third was lost during a late‑night session under the influence of cannabis. Eleven years later, the wallet’s balance had ballooned from $1,250 to just under $400,000.
The AI‑driven recovery workflow
- Data collection – cprkrn handed Claude access to a 200‑GB SATA drive that housed his college projects, old email archives, and a handful of encrypted zip files. The drive also contained a 12‑word BIP‑39 mnemonic phrase that he remembered from the original setup.
- Prompt engineering – Using a series of iterative prompts, the user asked Claude to:
- Index every text file on the drive.
- Identify strings that resembled passwords, passphrases, or seed‑phrase fragments.
- Correlate timestamps with known events (e.g., “first day of senior year”, “post‑exam celebration”).
- Pattern mining – Claude generated a ranked list of 3,214 candidate strings based on frequency, character diversity, and contextual relevance. The top candidates included variations of the user’s favorite slang, college‑year passwords, and a handful of “leet‑speak” constructions.
- Password synthesis – After eight weeks of back‑and‑forth, Claude suggested the phrase “lol420fuckthePOLICE!*:)”—a string that matched the user’s documented habit of mixing leet, profanity, and a trailing emoticon.
- Decryption test – The user fed the candidate into the wallet’s password prompt. The BIP‑39 phrase unlocked the encrypted backup file, which in turn revealed the private keys for the five BTC.
Benchmarks and resource usage
| Metric | Value |
|---|---|
| Total files scanned | 1,842,317 |
| Text‑only files processed | 1,102,489 |
| CPU time (Claude on Anthropic’s Claude‑3 Opus) | ~12 hours (distributed across 8 vCPU cores) |
| Peak RAM usage | 9.8 GB |
| Power draw (estimated) | 150 W (cloud GPU instance) |
| Total cost (cloud compute) | $18.70 (pay‑as‑you‑go) |
The compute footprint is modest compared to a traditional GPU‑heavy password‑cracking rig, which would consume several kilowatts and cost hundreds of dollars per hour for a comparable brute‑force effort.
Why brute force failed
Claude’s internal logs indicate that the user’s earlier attempts to brute‑force the password would have required 3.5 trillion guesses, assuming a 12‑character password drawn from a 94‑character set. At a rate of 10 million guesses per second (typical for a high‑end GPU rig), that translates to ~10 days of continuous operation—and still no guarantee of success because the password contained non‑ASCII symbols and a custom emoticon suffix.
Lessons for homelab builders
| Issue | Recommendation |
|---|---|
| Password complexity | Use a password manager that can generate and store truly random 32‑character strings. |
| Backup strategy | Export the wallet’s seed phrase to an encrypted AES‑256 file and store it on at least two offline media (e.g., a USB‑C flash drive and a write‑once optical disc). |
| Documentation | Keep a version‑controlled markdown log of all crypto‑related credentials. Tag each entry with a timestamp and a short description of the usage context. |
| AI‑assisted forensics | When you have a large corpus of legacy data, a language model can act as a semantic search engine, dramatically narrowing the search space for forgotten credentials. |
Wider implications
Claude’s success demonstrates a practical use‑case for large‑language models beyond chat and code generation: semantic forensics. By ingesting unstructured data and applying pattern‑recognition heuristics, an LLM can surface hidden clues that would be invisible to a human scanning thousands of files.
The episode also underscores a cultural shift. Crypto enthusiasts who once relied on “security through obscurity” are now seeing AI as a legitimate recovery tool—provided they grant the model access to the raw data. This raises two immediate concerns for anyone running a homelab:
- Data exposure – Feeding a model full disk images to a cloud service can inadvertently leak sensitive information if the provider’s data‑handling policies are not airtight.
- Model trustworthiness – Claude generated a plausible password, but it required human verification. Blindly trusting AI‑generated credentials could lead to false positives and wasted effort.
Build recommendation for a secure crypto‑recovery node
If you want to replicate a similar workflow on‑premises, consider the following hardware stack:
| Component | Reason |
|---|---|
| CPU: AMD Ryzen 9 7950X (16 cores) | High single‑thread performance for indexing large text corpora. |
| GPU: NVIDIA RTX 4090 (24 GB VRAM) | Optional acceleration for any downstream hash‑cracking tasks. |
| RAM: 64 GB DDR5 | Keeps the entire file index in memory, reducing disk I/O latency. |
| Storage: 2 TB NVMe SSD (for active work) + 4 TB SATA HDD (archival dump) | Fast SSD for the OS and AI model cache; HDD for bulk data ingestion. |
| Power: 850 W Platinum‑rated PSU | Ensures stable power delivery during prolonged compute runs. |
| OS: Ubuntu 24.04 LTS + Docker | Containerized Claude‑compatible inference (via Anthropic’s API) and local tooling (e.g., ripgrep, hashcat). |
Deploy the Anthropic API client inside a Docker container, mount the legacy drive read‑only, and run a scripted pipeline that:
- Extracts all UTF‑8 strings (
strings -a). - Indexes them with
ripgrep. - Sends batches of candidate phrases to Claude for contextual ranking.
- Writes the top‑N results to a secure vault for manual testing.
Bottom line
Claude didn’t magically “crack” the password; it acted as a highly efficient search assistant, correlating linguistic cues with the user’s known habits. For anyone managing a homelab that stores valuable crypto assets, the takeaway is clear: pair strong, offline backups with a well‑documented credential lifecycle, and keep an AI‑ready forensic pipeline on standby. When the inevitable human error—like a forgotten password after a smoke‑filled night—rears its head, you’ll have the tools to recover without resorting to raw brute force.

Comments
Please log in or register to join the discussion