Your photos know more about you than you think. GPS coordinates, your camera's serial number, the exact timestamp, even the device's orientation. Here's what's in EXIF data and how to strip it.
Every photo file you take contains a hidden second layer: EXIF (Exchangeable Image File Format) metadata. It's invisible when you view the image but readable by any tool that knows where to look. Most of it is harmless. Some of it is a privacy leak.
A typical photo from a modern smartphone contains:
EXIF data has legitimate uses. Photographers tag images with copyright info. Cameras embed orientation so phones display photos right-side-up. Mapping apps use GPS coordinates to show photos on maps of places you've been.
It also has problematic uses. A photo of a child posted on a public social network can reveal the family's home address through embedded GPS coordinates. A photo of a "selfie at home" posted to Twitter can be cross-referenced to identify someone's exact residence. The EXIF data persists when you save the file, when you re-upload it, when you email it — until something explicitly strips it.
Most major social networks (Facebook, Instagram, Twitter, LinkedIn) strip EXIF when you upload images through their apps. Many do not strip when you upload through the API or attach images to private messages. Even when they strip server-side, the file you originally uploaded still exists in your own device's record. Email attachments preserve EXIF. Cloud storage preserves EXIF. Image-hosting sites usually preserve EXIF.
Before stripping, check what's actually there. Use any of:
exiftool for power users. exiftool photo.jpg dumps every field.The browser-based viewer is the quickest path. Drop a photo, see what's in it, decide what to strip.
The simplest option: remove everything. The image's pixel data is untouched; only the metadata is cleared. The file size shrinks slightly (usually 5-100 KB depending on what was there).
Use pictoolkit's EXIF tool — drop a photo or batch of photos, click "Strip all metadata", download cleaned files. Conversion happens in your browser; the original files never leave your device.
This is the right approach for personal photos you're sharing publicly.
Sometimes you want to keep some metadata. Photographers often want to preserve copyright info but strip GPS. To selectively strip, use a tool that lets you pick fields:
exiftool -gps:all= photo.jpg removes only GPS data, leaving everything else.On iPhone, the easiest way to strip GPS from a specific photo:
This removes GPS but leaves other EXIF. To strip everything, the easiest path is sharing the photo through the screenshot tool or saving to a third-party app that strips metadata.
On Android: many third-party gallery apps (Simple Gallery, etc.) have a "remove metadata" option in the share menu. The stock Google Photos app does not strip metadata; you have to use a separate tool.
Removing EXIF does not anonymize the image content itself. Visual identifiers are still there:
For most people, stripping EXIF is sufficient. For situations requiring stronger anonymity (protest photos, whistleblower documents), use a tool that strips EXIF and re-encodes the image to remove sensor patterns, or use a fresh anonymous camera.
Strip EXIF in your browser with pictoolkit's metadata viewer. View first, then decide what to remove — all without uploading your photos anywhere.