Thursday, March 30, 2017

3/30/17 Report - Coin Bracelet Find. Computer Security and How To Avoid Sharing More Information Than You Really Want To Especially When You Send Photos.

Written by the TreasureGuide for the exclusive use of

Dug Bracelet of Drilled Coins.
Here is a dug coin bracelet.  At first I didn't think these would be real coins, but after inspecting them closely I'm pretty sure they are.

Each one is a un sol de oro.  Heavily tarnished or discolored but not old - 1975.

Despite the fact that oro means gold, there is no gold in these coins.  They are brass.

It appears that somebody worked the coins and drilled holes in them.  Close inspection of the holes shows they were drilled and they still have rough edges.  The connectors are hand made too.

Closer View of One Coin.


This is the digital age.  We are an internet community.  I thought you might be somewhat interested in what other people who access this blog are using.  For browsers, the list in descending order is Chrome, Safari, Internet Explorer and Firefox.  For operating systems it is Windows, Macintosh and then Android.

There has been a lot in the news lately about hacking and privacy.  It is a topic that is very relevant to treasure hunting.  When I was doing some consulting for a TV show, I was asked if I knew of any treasure maps.  That is a question I received previously from another TV show, and one producer commented that real treasure maps are really hard to find.

They are hard to find.  They aren't really meant to be public.  When they do exist, they are often coded.  But today instead of drawing maps, people are simply keeping GPS coordinates instead.

Treasure hunters, like everybody else today, use computers and electronic communications extensively, but they might think those forms of communication and data storage are more private than they really are.

People sometimes send photos of finds and things to me for the blog.  They might not  know sometimes the file also includes information about where the photo was taken.  I never post that information, so you don't have to worry.  I don't even look at it myself.  I just make a snipping or screen print and post that.

If you wouldn't say something out loud in a crowded room, don't say it over a phone or internet connection without encryption or some serious security measures.

You might know about the bill to repeal the Broadband Consumer Privacy Rules, which I understand would allow your internet service provider to sell your browsing history.  Maybe you also heard that tech genius Mark Zuckerberg and FBI Director James Comey both use tape to cover the camera on their laptops due to the ease of hacking.

If you are reading this blog, I know you use the internet or a smartphone, so I think you should be aware that your electronic communications are probably neither secure or private.  I doubt that most people realize how insecure those things are.  If you don't care if your browsing history might be sold or made public, or if you don't care if your system is hacked, fine - no problem, but you simply can not be sure your electronic communications or data is private and secure.  I don't care if you are the President of the United States, leader of Germany, Secretary of State, head of a high tech company or the FBI, or just an average Joe, you can't assume that your electronic communications or data has not or can not be compromised.

The United States bugs and hacks.  Why would anyone think that other countries, especially those that are not supposed to be our friends, aren't doing the same type of things. You can assume that they are.  All this fuss about Russia trying to affect the election is silly.  I would expect no less of them. Foreign leaders aren't going to play fair and be nice, and neither are crooks.  That is just the way it is.

My point here is that you shouldn't assume that your electronic devices and computers are totally secure and private.


I want you to know that if you send me photos, I never look for any data other than the picture and any email message that you send. You don't have to worry about me checking out the location of where you took a picture. There are steps you can take to remove that data if and when you want to.

Just to make sure I made this clear, I don't post photos. I make a snipping of the photo or picture and post that. I never post a photo so that the additional properties and data can be accessed.

You should know how to find that data in your photo files.

The location information is stored as “metadata” embedded in the photo files themselves. All you have to do is view the file’s properties and look for it.

If you use Windows, after downloading the image file to your computer, right-click on the file, select Properties, and then click the Details tab. Look for the Latitude and Longitude coordinates under GPS.

That is how easy it is to find where photo was taken if your camera or device stores that data.

If you want to remove the location information from your photo files,so you won't be telling everyone where you made those special finds or where you were when you took the photo, here is how you can remove that data when using an iPhone.

On an iPhone, open the Settings app, tap Privacy, and tap Location Services. Tap the Camera app in the list and select “Never” for “Allow Location Access.” The Camera app won’t have access to your location and won’t be able to embed it in photos.

If you want to know how to do it using other systems or devices, you might want to visit the following site.


The surf is down to around two or three feet, but we still have a very good low tide.

Happy hunting,