FAQ

Frequently Asked Questions

We use AI-assisted time estimates and latest multi-GPU hardware to explore the most promising keyspaces first, so qualified cases get answers faster and with higher probability of success.

Which wallets do you support?

We handle desktop, mobile, and browser wallets across major chains as well as hardware wallets and encrypted archives. For the current list, see All Supported Wallets.

How long does a typical recovery take?

There is no universal timeframe. The key driver is the quality and depth of your hints (length, character sets, patterns, endings, languages, dates, etc.). With strong hints, our AI estimation plus targeted attacks can provide a realistic timeframe quickly. With no usable hints, pure brute force beyond ~7 characters is rarely feasible on most formats.

We start with a free offline feasibility assessment and share an estimate before any paid work.

Is recovery guaranteed?

No provider can guarantee recovery. Outcomes depend on wallet type, encryption, password complexity, and the hints provided. What we guarantee is a transparent process, a risk-free initial assessment, and the use of specialized AI and high-performance GPU clusters to maximize your chances.

What are your fees?

Fees are success-based — you pay only if recovery succeeds:

  • Value up to 10 BTC: 18%
  • Value 10–50 BTC: 15%
  • Value 50–100 BTC: 13%
  • Value >100 BTC: 8%

For other assets (ETH, altcoins, NFTs, encrypted files), we provide a clear quote after assessing value and feasibility.

How do you handle security and privacy?

For transfers, we provide a one-time secure Dropbox link so you can upload an encrypted archive. After download, your files are processed offline on isolated systems — we don’t keep working copies in online storage. We do not require seed phrases or private keys for the initial assessment, and we delete your files after the case unless you ask us to retain them.

What information should I include to maximize success?
  • Approximate length and character sets (letters/digits/symbols, which symbols).
  • Common patterns (e.g., capitalized word + 2 digits, year endings, “!!”, “88”).
  • Relevant words/names (nicknames, brands, pets, places) and dates.
  • Keyboard/language used (QWERTY/QWERTZ, non-English letters).

Even small details can reduce the keyspace dramatically and change an impossible case into a solvable one.

What does the process look like?
  1. Inquiry: Submit your case and describe your hints.
  2. Feasibility: We run a free offline assessment and share an estimate.
  3. Agreement: If viable, we propose scope, timeline, and fee terms.
  4. Recovery: We run targeted attacks on multi-GPU nodes.
  5. Delivery: On success, access is returned and success fee applies.

Do you handle corporate or legal matters?

Yes. We work with exchanges, law firms (inheritance, bankruptcy, litigation), and businesses. We can provide NDAs, expert reports, and chain-of-custody documentation on request.



Ready for a free assessment?

Share your case and optional password hints. We’ll run a free offline feasibility check and send an AI-assisted time estimate.