What If $800 Million Were Buried Under a Mountain of Trash?

What If $800 Million Were Buried Under a Mountain of Trash?

Authors

D'CENT Wallet Team

Hardware wallet security experts. Building secure crypto storage since 2018.

D'CENT Wallet Team

Key Answer: Proper backup of your recovery phrase can prevent permanent loss of your cryptocurrency holdings. However, even with the best backup practices, a hardware wallet cannot protect you if you sign a malicious transaction, so safe storage and careful verification remain essential.


Key Takeaways

  • Lost Fortune: James Howells lost access to approximately 7,500-8,000 BTC (worth hundreds of millions of dollars) when he accidentally threw away a hard drive in 2013
  • Recovery Phrase is Everything: The most valuable part of any crypto wallet is not the device itself, but the recovery phrase
  • Offline Storage: Offline backup stored in a secure physical location is the foundation of crypto security
  • No Recovery Without Keys: No amount of money or legal action can recover crypto assets without the proper keys
  • Learn From Others: Learning from others' mistakes is far less costly than making your own

The Story of James Howells and the Billion-Dollar Landfill

In the summer of 2009, a Welsh IT worker named James Howells began mining Bitcoin on his laptop. Back then, Bitcoin was worth virtually nothing. The whole operation seemed more like a hobby than an investment. Over several months, Howells accumulated approximately 7,500-8,000 BTC (different sources report varying amounts), storing the private keys on his laptop's hard drive.

Life moved on. In 2013, during a routine house cleaning, Howells made a decision that would haunt him for over a decade. His girlfriend complained about the clutter. Looking at the old laptop, which had stopped working after his daughter spilled lemonade on it, Howells did what seemed logical at the time. He salvaged the hard drive for potential data recovery later and threw away the damaged laptop.

Months passed. Then, one ordinary day, Howells was tidying up again. He spotted a hard drive sitting in a drawer. Without thinking twice, he tossed it into a black garbage bag along with other unwanted items.

It was the wrong hard drive.

The one containing his Bitcoin fortune went straight to the Docksway landfill in Newport, Wales. By the time Howells realized his mistake, it was already buried under thousands of tons of garbage.

A Decade of Fighting for Recovery

When Bitcoin's price began its historic climb, the magnitude of the loss became clear. His lost Bitcoin, once worth a few hundred dollars, grew to be worth hundreds of millions.

Howells did not give up. He spent years developing an elaborate recovery plan involving AI-powered sorting robots, X-ray scanning equipment, and a team of experts. He offered Newport City Council a significant portion of the recovered Bitcoin's value. He proposed environmental restoration projects. He promised to donate to local causes.

The council said no. Environmental regulations prohibited excavating the landfill. The risk of disturbing decades of compressed waste, including potentially hazardous materials, was too great.

In December 2024, Howells filed a lawsuit against the council. In January 2025, a UK judge dismissed the case. The landfill is now scheduled to become a solar farm by 2026, effectively sealing the Bitcoin beneath renewable energy infrastructure forever.

Howells has vowed to take his fight to the European Court of Human Rights. He has also launched a tokenization project called Ceiniog Coin, attempting to create value from his lost fortune through alternative means. But the original Bitcoin remain inaccessible, likely forever.


Why This Matters for Every Crypto Holder

James Howells' story is not just a cautionary tale about one man's misfortune. It reveals a fundamental truth about cryptocurrency that many beginners overlook.

Your crypto assets do not live inside any device.

When you own Bitcoin or any other cryptocurrency, what you actually possess is control over a set of cryptographic keys. These keys exist as information. The device you use, whether it is a laptop, phone, or hardware wallet, is simply a tool for accessing and using those keys.

This is why the recovery phrase (also called seed phrase or recovery words) is everything. This sequence of 12 or 24 words can regenerate your entire wallet and all its contents. Lose the recovery phrase, and you lose your assets. It does not matter if your wallet contained $100 or $800 million.

Important to understand: A hardware wallet significantly reduces the risk of your keys being stolen by hackers or malware. However, if you sign a malicious transaction or fall victim to approval-based phishing, losses can still occur. The hardware wallet protects your keys, but the final decision to authorize any transaction rests with you.


How to Protect Your Crypto: Safe Backup Practices

Step 1: Write Down Your Recovery Phrase Properly

When you create any cryptocurrency wallet, you will be given a recovery phrase. This is the moment that determines your long-term security.

  • Use pen and paper, not digital storage
  • Write clearly and double-check each word
  • Note the exact order of words (this matters)
  • Never take a photo or screenshot of your recovery phrase
  • Never type it into any website, email, or messaging app

Step 2: Choose a Safe Storage Location

Your recovery phrase needs physical protection from damage, theft, and loss.

  • Store in a fireproof and waterproof container if possible
  • Consider multiple backup copies in different secure locations
  • Think about who needs to know and who should never know
  • Avoid obvious hiding spots that burglars might check
  • Some users opt for metal backup plates that resist fire and water damage

Step 3: Plan for the Unexpected

Howells' mistake happened during ordinary life circumstances. Your backup plan should account for everyday scenarios.

  • Label your backup clearly enough that you will recognize it, but not so obviously that others will know its value
  • Inform a trusted family member about the existence and location of your backup
  • Consider what happens if you are incapacitated
  • Review your backup storage annually

Common Crypto Backup Mistakes to Avoid

Storing Recovery Phrases Digitally

Taking a photo of your recovery phrase might seem convenient. Saving it in a notes app or cloud storage feels modern and accessible. Both approaches expose your assets to significant risk. Photos sync to cloud services. Cloud accounts get hacked. Phones get stolen or inspected. Any digital copy of your recovery phrase creates a potential attack vector that did not exist before.

Relying on Memory Alone

Human memory is unreliable over long periods. Words get forgotten. Order gets confused. Even if you successfully memorize your phrase today, a head injury, illness, or simple passage of time could erase it.

Treating Hardware as the Backup

James Howells stored his keys on a hard drive and treated that device as his backup solution. When the device was discarded, the assets were gone. A hardware wallet or any storage device is not a backup. Only the recovery phrase serves that function.

Telling Too Many People

While having a trusted person know about your backup is prudent, sharing your recovery phrase with multiple people dramatically increases the risk of theft. Every person who knows your phrase could potentially access your funds.

Using Pre-Generated or Shared Phrases

Never use a recovery phrase that someone else provided to you. Never use a wallet that came with the recovery phrase already revealed. Scammers sell pre-configured wallets or share recovery phrases, waiting for victims to deposit funds before stealing them.


Crypto Backup Security Checklist

Use this checklist to verify your backup security:

Recovery phrase is written on paper or metal, not stored digitally
Backup is stored in a secure, private location
Backup is protected from fire, water, and physical damage
At least one trusted person knows where to find the backup in an emergency
You have verified the backup by testing recovery (with a small amount first if unsure)
No photos or digital copies of the recovery phrase exist
The recovery phrase has never been entered into any website or online form
You review backup condition and accessibility every 6-12 months
You have a plan for what happens to your crypto if something happens to you
Token approvals and connected DApps are reviewed and unnecessary ones removed
Firmware on any hardware wallet is kept updated


FAQ

Q1: What exactly happened to James Howells' Bitcoin?
A: James Howells mined approximately 7,500-8,000 Bitcoin starting in 2009 and stored the private keys on a laptop hard drive. In 2013, he accidentally threw away the hard drive during house cleaning. It ended up in the Docksway landfill in Newport, Wales, where it remains buried. Without the private keys, the Bitcoin cannot be accessed, regardless of its value.

Q2: Can James Howells ever recover his Bitcoin?
A: Recovery appears extremely unlikely. Newport City Council has repeatedly denied excavation requests due to environmental regulations. A court case was dismissed in January 2025, and the landfill is scheduled to become a solar farm by 2026. While Howells continues legal efforts, the technical and legal barriers make recovery improbable.

Q3: Why is the recovery phrase more important than the hardware wallet itself?
A: A hardware wallet is a secure tool for storing and using your private keys, but it is ultimately just a device. The recovery phrase can regenerate your entire wallet on any compatible device. If you lose your hardware wallet but have your recovery phrase, your assets are safe. If you lose your recovery phrase, no device can help you recover your assets.

Q4: Is taking a photo of my recovery phrase really that dangerous?
A: Yes. Photos automatically sync to cloud services like iCloud or Google Photos. Cloud accounts can be compromised through data breaches, phishing, or weak passwords. Even if your phone is lost or stolen, anyone with access to your photo library could find your recovery phrase. The convenience is not worth the significant increase in risk.

Q5: Can a hardware wallet be hacked?
A: A hardware wallet significantly reduces the risk of key theft from online attacks and malware. However, no device provides complete protection. If you are tricked into signing a malicious transaction or granting harmful approvals to a DApp, losses can still occur. The hardware protects your keys, but you must still verify every transaction carefully.

Q6: How many backup copies of my recovery phrase should I have?
A: Most security experts recommend having two to three backup copies stored in different secure locations. This protects against localized disasters like fire or flooding. However, each additional copy increases the risk of theft or discovery. Balance redundancy against security based on the value of your holdings and your personal circumstances.

Q7: What should I do if I think someone has seen my recovery phrase?
A: If you suspect your recovery phrase has been compromised, transfer your assets to a new wallet immediately. Create a new wallet, generate a fresh recovery phrase, and move all your cryptocurrency to the new addresses. Do not delay. Attackers with your recovery phrase can drain your wallet at any time.

Q8: Is it safe to buy a second-hand hardware wallet?
A: Purchasing a used hardware wallet carries significant risk. The previous owner may have recorded the recovery phrase, allowing them to steal any funds you add later. If you must use a second-hand device, always perform a complete factory reset and generate a new recovery phrase from scratch. Purchasing new from an official source is strongly recommended.


 

Explore Secure Self-Custody with D'CENT (Click!)
Explore D'CENT Wallet and see how easy safe self‑custody can be.

 


Did you find this article helpful?

If it clarified even one security risk for you, consider sharing it with others who may benefit 😎

⬇️⬇️⬇️⬇️⬇️

[D’CENT Wallet]
D’CENT Wallet is created by IoTrust, a company founded by security experts with over two decades of security know-how and engineering experience in developing deeply embedded security solutions based on secure-chip technology (SE and TEE). 

D’CENT Wallet caters to the diverse needs of cryptocurrency users, prioritizing security and user experience. Users can choose the Biometric Wallet, Card type Wallet, or the free-to-use Software Wallet.
Disclaimer:
This blog is for educational purposes only. Information presented here, including projects or brands mentioned, is informative and not financial, legal, or tax advice. While we strive for accuracy, we cannot be held liable for any inaccuracies. Cryptocurrencies are inherently risky. Do your own thorough research and consider consulting a financial advisor for investment decisions aligned with your goals and risk tolerance. External links may be present and we are not responsible for their content or practices. Review their terms of service and privacy policies.

Biometric Wallet

$139.00
$159.00