Learn how to remove EXIF metadata from photos and files to protect your privacy. Strip GPS location, camera info, and personal data before sharing online.
A few months ago, a friend posted a photo of her new apartment on a rental review forum. She thought she was being careful — no address in the post, no street signs in the frame, nothing that could identify where she lived.
Within two hours, someone in the comments had pinpointed her exact building. Not from anything visible in the photo. From the GPS coordinates embedded in the image file itself.
She had no idea those coordinates were there. Most people don't. Every photo you take with a smartphone — and many taken with digital cameras — contains an invisible dossier of information called EXIF metadata. Your exact location. The date and time. Your device model. Sometimes your name. And when you upload that photo to a forum, email it to a stranger, or post it on a website that doesn't strip metadata automatically, all of that information goes with it.
This is not a theoretical risk. It's a daily one. And in this guide, I'll show you exactly what metadata hides in your files, why it matters, and how to remove it completely — on every platform, using free tools, before you share anything online again.
EXIF stands for Exchangeable Image File Format. It's a standard that embeds technical and contextual information directly into image files — JPEGs, TIFFs, PNGs, and others. This metadata is invisible when you view the photo normally, but it's fully readable by anyone who knows where to look.
Your camera or phone writes this data automatically every time you press the shutter button. You never opted into it. There's no popup asking permission. It just happens.
Here's a real-world example of what a typical smartphone photo contains:
| Metadata Field | Example Value |
|---|---|
| GPS Latitude | 40.7128° N |
| GPS Longitude | 74.0060° W |
| GPS Altitude | 10.2 meters |
| Date/Time Original | 2026:03:15 14:32:07 |
| Camera Make | Apple |
| Camera Model | iPhone 16 Pro |
| Lens Info | 6.765mm f/1.78 |
| Software | iOS 19.3 |
| Image Width | 4032 |
| Image Height | 3024 |
| ISO Speed | 64 |
| Exposure Time | 1/2000 sec |
| F-Number | f/1.78 |
| Flash | Off |
| Color Space | sRGB |
| Owner Name | Jane Doe |
| Serial Number | DNXXXXXXXX |
| Thumbnail | Embedded 160x120 preview |
That's not an exaggeration. That's a typical smartphone photo. The GPS coordinates alone are accurate to within a few meters — enough to identify a specific house, office, or school.
EXIF is specific to images, but metadata exists in virtually every file format:
If you've ever emailed a PDF to a client and wondered how they knew you used a specific piece of software — now you know.
Let's move past the abstract and talk about specific scenarios where EXIF data has caused real problems.
This is the most common risk. You take a photo at home — your pet, your cooking, your new furniture — and post it online. The GPS coordinates in that image now point directly to your residence. For anyone concerned about stalking, domestic violence, or simply personal security, this is a serious threat.
Photos taken at work contain GPS data pointing to your employer's location. Combined with timestamps showing when you're regularly at that address, someone can piece together your daily schedule.
Parents share photos of their children constantly — on social media, in family group chats, on school forums. If those photos contain GPS data from your home or your child's school, you've handed a potential predator a map.
A series of geotagged vacation photos tells the world two things: where you are, and where you aren't. Burglars have used social media posts to identify when homeowners are away.
Journalists, activists, and whistleblowers face the highest stakes. A photo sent to a news organization with EXIF data intact can reveal the source's identity, location, and device — potentially putting lives at risk. Several documented cases exist where EXIF data led to the identification and arrest of anonymous sources.
Lawyers, healthcare workers, and financial professionals who share photos or documents containing metadata risk violating confidentiality agreements, HIPAA, GDPR, or other regulatory requirements.
Before you remove metadata, it helps to see exactly what's there. Here are the quickest methods.
Cmd + I)You can also drag any image into a browser-based image info viewer to instantly see every piece of embedded metadata without installing anything.
Now the practical part. Here's how to strip metadata on every major platform.
Windows has a native metadata removal tool that most people don't know about.
Pros: No software needed, works on batch selections. Cons: Doesn't remove all EXIF fields in some cases. No preview of what's being removed.
macOS doesn't have a one-click metadata removal tool built in, but you can use Preview to export a clean copy:
For complete removal on macOS, use the Terminal:
# Install exiftool via Homebrew
brew install exiftool
# Remove all metadata from a single file
exiftool -all= photo.jpg
# Remove all metadata from all JPEGs in a folder
exiftool -all= *.jpg
# Remove only GPS data (keep other metadata)
exiftool -gps:all= photo.jpgBefore sharing (preventive):
Before sharing (per-photo):
Disable GPS in camera:
Remove from existing photos:
Android doesn't have a built-in metadata removal tool. Your best options:
ExifTool app from F-Droid for full control# Using exiftool (most thorough)
sudo apt install libimage-exiftool-perl
exiftool -all= photo.jpg
# Using mat2 (metadata anonymisation toolkit)
sudo apt install mat2
mat2 photo.jpg
# Using ImageMagick (strips profiles including EXIF)
convert photo.jpg -strip cleaned_photo.jpg
# Batch process entire directory
exiftool -all= -r /path/to/photos/The -r flag processes subdirectories recursively. Add -overwrite_original if you don't want backup files created.
If you don't want to install anything, browser-based tools process your images entirely in your browser — the files never leave your device.
On akousa.net, you can use the Photo Editor to open any image, make edits or adjustments, and export a clean copy. When you export through a browser-based canvas pipeline, EXIF metadata is naturally stripped because the browser's Canvas API creates a brand-new image from pixel data — no original metadata survives the process.
This also applies to tools like the Image Compressor, Image Resizer, and Image Format Converter. Any time an image passes through a browser-based processing pipeline, the output is a fresh file without the original's metadata baggage.
For PDFs, the PDF Metadata viewer lets you inspect exactly what information is embedded in your documents before you share them.
Not all platforms handle your metadata the same way. Here's the current state as of 2026:
| Platform | Strips EXIF on Upload? | Strips GPS? | Notes |
|---|---|---|---|
| Yes | Yes | Strips most EXIF, but Facebook stores the data internally | |
| Yes | Yes | Same as Facebook — stripped from public view, retained by Meta | |
| Twitter/X | Yes | Yes | Strips all EXIF data from uploaded images |
| Partial | Yes | Strips GPS but may retain some camera data | |
| Yes | Yes | Heavy compression also destroys metadata | |
| Telegram | No (as file) | No (as file) | If sent as "file" instead of "photo," original EXIF is preserved |
| Discord | No | No | Discord does NOT strip EXIF data from uploaded images |
| No | No | Attachments retain all original metadata | |
| Slack | No | No | Files uploaded to Slack retain metadata |
| iMessage | Varies | Varies | Depends on settings; location can be included |
The critical takeaway: platforms that strip metadata on upload still store it on their servers. Facebook, Instagram, and others use your GPS data, timestamps, and device info for advertising and content analysis. Stripping metadata before upload means the platform never gets that data in the first place.
And for platforms like Discord, Slack, and email — you're entirely on your own. If you don't strip it, it's there for anyone to read.
Photos get most of the attention, but document metadata can be equally revealing.
A PDF might contain:
If you're a lawyer sending a contract, a consultant sharing a proposal, or anyone distributing professional documents — check your PDF metadata before sending. The PDF Metadata tool on akousa.net lets you inspect all embedded fields instantly.
Microsoft Word documents are particularly metadata-heavy:
To clean Word documents: Go to File > Info > Check for Issues > Inspect Document. Select all categories and click Inspect, then Remove All for each category.
If you regularly share files externally, build metadata removal into your workflow:
Screenshots contain less data than photos but still include:
If you're sharing screenshots for bug reports, tutorials, or anonymous posts, strip this data too.
EXIF data often includes a thumbnail preview of the original image. Even if you crop or blur part of a photo and re-save it, the original uncropped/unblurred version may persist as the EXIF thumbnail. This has caught people off guard — they blur a face or license plate, but the original is still readable in the thumbnail.
The solution: strip all EXIF data, not just GPS coordinates.
If you shoot in RAW format (CR2, NEF, ARW, etc.), your files contain even more metadata than JPEGs — including detailed lens profiles, focus points, and sometimes a full-resolution JPEG preview. Always convert to a standard format and strip metadata before sharing.
When using online tools, the key question is: does the file leave your device? Server-side tools upload your image to a remote server for processing, which means the server operator has access to your file and its metadata.
Browser-based tools that use client-side JavaScript process everything locally. The file never leaves your browser. This is why client-side tools are fundamentally more private — there's no server to trust, no upload to intercept, no copy retained on someone else's infrastructure.
Tools on akousa.net process images and documents entirely in your browser. Nothing is uploaded to any server.
If you deal with large volumes of files, manual removal isn't practical. Here are automation approaches.
# Watch a folder and auto-strip metadata from new files
inotifywait -m -e create /path/to/watch/ |
while read path action file; do
exiftool -all= -overwrite_original "$path$file"
doneCreate a batch script that runs ExifTool on a specific folder, then schedule it to run periodically:
exiftool -all= -overwrite_original -r C:\Users\YourName\ShareFolder\For developers who accidentally commit images with metadata to repositories:
#!/bin/sh
# .git/hooks/pre-commit
for file in $(git diff --cached --name-only --diff-filter=ACM | grep -iE '\.(jpg|jpeg|png|tiff|gif)$'); do
exiftool -all= -overwrite_original "$file"
git add "$file"
doneThis automatically strips metadata from any image file before it's committed.
No. EXIF metadata is stored in a separate section of the file, not in the pixel data itself. Removing it doesn't alter the actual image in any way. The file size will decrease slightly (typically by a few kilobytes to a few hundred kilobytes, depending on how much metadata and how large the embedded thumbnail is), but the visible image remains identical, pixel for pixel.
Once EXIF data is properly stripped from a file, it cannot be recovered from that file. However, if you uploaded the original version somewhere before stripping it — to a cloud service, social media platform, or via email — copies with the original metadata may still exist on those servers. Always strip metadata before the first share, not after.
Most smartphones have location tagging enabled by default, though this varies by manufacturer and region. iPhones prompt you to allow location access for the Camera app during initial setup, but most users tap "Allow." Android phones often enable it by default in the camera settings. Always check your camera app's settings and disable location tagging if you don't need it.
Yes, it's completely legal to remove metadata from your own photos and files. In fact, privacy regulations like GDPR encourage minimizing personal data in shared files. The only scenario where metadata removal could be legally problematic is if you're trying to remove copyright or ownership information from someone else's work, which could violate the DMCA's anti-circumvention provisions.
JPEG and TIFF files typically contain the most extensive EXIF data, including GPS, camera settings, and thumbnails. RAW formats (CR2, NEF, ARW) contain even more — detailed lens data, focus maps, and full-size preview images. PNG files support metadata but typically contain less than JPEG. WebP and AVIF support EXIF but implementations vary. PDFs can contain extensive document metadata, author info, and revision history. When in doubt, strip metadata from any file before sharing it.
Here's a quick reference for keeping your files clean:
Metadata was designed to help photographers organize their work. It was never designed for a world where every photo gets shared with strangers on the internet. The technology hasn't caught up with the reality of how we use images today, so the responsibility falls on you.
The good news: it takes about 10 seconds to strip metadata from a photo. That's 10 seconds to prevent someone from knowing where you live, where you work, what device you use, and when you were there.
That's a trade worth making every single time.