When Ethereum conducted its presale in summer 2014, early participants like Estonian banker Rain Lõhmus could hardly have predicted the trajectory ahead. Purchasing 250,000 ETH at roughly $0.30 per token seemed like a speculative gamble. Today, with ETH trading at $2.98K, that original allocation represents approximately one billion dollars in value—a staggering transformation that underscores both the gains and tragedies of early crypto adoption.
Yet Lõhmus’s position differs fundamentally from other legendary crypto losses. His fortune isn’t spent, burned, or physically destroyed. It sits visible on the blockchain, frozen in an address that hasn’t moved since Ethereum’s launch, representing roughly 0.2% of the network’s 120.7 million circulating tokens. The reason? A forgotten password and a lost JSON wallet file that make recovery effectively impossible.
The Encryption Architecture Behind Presale Wallets
The core challenge stems from how Ethereum’s 2014 presale structured its wallet files. Rather than simple keystores, participants received encrypted JSON documents that required a password to unlock. This encryption mechanism relied on PBKDF2-HMAC with unique salting—a deliberately robust approach designed to resist computational attacks.
The mathematics work against any recovery attempt. Brute-forcing such encryption demands testing password candidates against a finite but enormous search space. Even with modern hardware, the computational requirements render systematic guessing impractical without substantial clues about the original password.
More problematically, entering an incorrect password during decryption doesn’t necessarily fail outright. Instead, it produces what appears to be a valid seed phrase that generates a legitimate-looking Ethereum address—just not the correct one. This means recovery efforts require a verification step confirming that each derived address actually matches the target wallet. Near-misses provide no shortcut.
Why This Differs From Bitcoin Pizza Day and Other Lost Fortunes
Crypto history contains several billion-dollar cautionary tales, each illustrating different failure modes of digital asset management.
Laszlo Hanyecz’s famous Bitcoin Pizza transaction from May 2010 involved deliberately spending 10,000 BTC—valued at roughly $40 at the time—for two pizzas. Those coins would today be worth approximately $1.2 billion. But the loss was intentional; the Bitcoin was spent in a legitimate transaction.
James Howells’s case presented an alternative tragedy: a hard drive containing between 7,500 and 8,000 BTC accidentally discarded in a Welsh landfill. Years of legal efforts to excavate the site culminated in a 2025 High Court dismissal, leaving that billion-dollar cache physically inaccessible beneath refuse.
Lõhmus’s situation occupies a distinct category. The wealth isn’t gone—it’s suspended. On-chain verification confirms the address holds exactly 250,000.0256 ETH, untouched since Ethereum allocations became spendable. The funds even accumulated airdropped tokens over the years simply by existing on the active blockchain. Yet without password recovery or the original JSON file, accessing this billion-dollar fortune remains beyond reach.
The Realistic Path Forward (or Lack Thereof)
Password recovery services do exist, specializing in exactly this scenario. However, their success rates reveal the difficulty. Most recoveries occur when clients retain substantial password fragments or can reconstruct them through personal wordlists based on historical patterns. Even optimistic practitioners frame outcomes in terms of months-long engineering efforts, constrained dictionaries, and accumulated expertise—not guaranteed breakthroughs.
For Lõhmus, the binary reality is stark. If both the presale JSON file and meaningful password clues are truly lost, recovery probability approaches zero. If both exist, the challenge transforms into an extended technical undertaking with measurable but uncertain odds of success—potentially consuming months or years.
The distinction matters. Unlike Bitcoin Pizza Day’s voluntary transaction or Howells’s physically destroyed hardware, Lõhmus’s billion dollars remain theoretically recoverable through software means. Yet in practice, without the encryption keys or sufficient password intelligence, that theoretical possibility remains dormant. The one billion dollar Ethereum wallet exists as a permanent reminder that digital assets, despite their on-chain transparency, can be as irretrievably lost as any physical treasure.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Why a Billion-Dollar Ethereum Fortune Remains Locked Away Forever
When Ethereum conducted its presale in summer 2014, early participants like Estonian banker Rain Lõhmus could hardly have predicted the trajectory ahead. Purchasing 250,000 ETH at roughly $0.30 per token seemed like a speculative gamble. Today, with ETH trading at $2.98K, that original allocation represents approximately one billion dollars in value—a staggering transformation that underscores both the gains and tragedies of early crypto adoption.
Yet Lõhmus’s position differs fundamentally from other legendary crypto losses. His fortune isn’t spent, burned, or physically destroyed. It sits visible on the blockchain, frozen in an address that hasn’t moved since Ethereum’s launch, representing roughly 0.2% of the network’s 120.7 million circulating tokens. The reason? A forgotten password and a lost JSON wallet file that make recovery effectively impossible.
The Encryption Architecture Behind Presale Wallets
The core challenge stems from how Ethereum’s 2014 presale structured its wallet files. Rather than simple keystores, participants received encrypted JSON documents that required a password to unlock. This encryption mechanism relied on PBKDF2-HMAC with unique salting—a deliberately robust approach designed to resist computational attacks.
The mathematics work against any recovery attempt. Brute-forcing such encryption demands testing password candidates against a finite but enormous search space. Even with modern hardware, the computational requirements render systematic guessing impractical without substantial clues about the original password.
More problematically, entering an incorrect password during decryption doesn’t necessarily fail outright. Instead, it produces what appears to be a valid seed phrase that generates a legitimate-looking Ethereum address—just not the correct one. This means recovery efforts require a verification step confirming that each derived address actually matches the target wallet. Near-misses provide no shortcut.
Why This Differs From Bitcoin Pizza Day and Other Lost Fortunes
Crypto history contains several billion-dollar cautionary tales, each illustrating different failure modes of digital asset management.
Laszlo Hanyecz’s famous Bitcoin Pizza transaction from May 2010 involved deliberately spending 10,000 BTC—valued at roughly $40 at the time—for two pizzas. Those coins would today be worth approximately $1.2 billion. But the loss was intentional; the Bitcoin was spent in a legitimate transaction.
James Howells’s case presented an alternative tragedy: a hard drive containing between 7,500 and 8,000 BTC accidentally discarded in a Welsh landfill. Years of legal efforts to excavate the site culminated in a 2025 High Court dismissal, leaving that billion-dollar cache physically inaccessible beneath refuse.
Lõhmus’s situation occupies a distinct category. The wealth isn’t gone—it’s suspended. On-chain verification confirms the address holds exactly 250,000.0256 ETH, untouched since Ethereum allocations became spendable. The funds even accumulated airdropped tokens over the years simply by existing on the active blockchain. Yet without password recovery or the original JSON file, accessing this billion-dollar fortune remains beyond reach.
The Realistic Path Forward (or Lack Thereof)
Password recovery services do exist, specializing in exactly this scenario. However, their success rates reveal the difficulty. Most recoveries occur when clients retain substantial password fragments or can reconstruct them through personal wordlists based on historical patterns. Even optimistic practitioners frame outcomes in terms of months-long engineering efforts, constrained dictionaries, and accumulated expertise—not guaranteed breakthroughs.
For Lõhmus, the binary reality is stark. If both the presale JSON file and meaningful password clues are truly lost, recovery probability approaches zero. If both exist, the challenge transforms into an extended technical undertaking with measurable but uncertain odds of success—potentially consuming months or years.
The distinction matters. Unlike Bitcoin Pizza Day’s voluntary transaction or Howells’s physically destroyed hardware, Lõhmus’s billion dollars remain theoretically recoverable through software means. Yet in practice, without the encryption keys or sufficient password intelligence, that theoretical possibility remains dormant. The one billion dollar Ethereum wallet exists as a permanent reminder that digital assets, despite their on-chain transparency, can be as irretrievably lost as any physical treasure.