How to remove EXIF metadata from photos

Your photos know more about you than you think. GPS coordinates, your camera's serial number, the exact timestamp, even the device's orientation. Here's what's in EXIF data and how to strip it.

Every photo file you take contains a hidden second layer: EXIF (Exchangeable Image File Format) metadata. It's invisible when you view the image but readable by any tool that knows where to look. Most of it is harmless. Some of it is a privacy leak.

What's in EXIF data

A typical photo from a modern smartphone contains:

  • GPS coordinates — exact latitude and longitude, often within 5-10 meters of where the photo was taken.
  • Timestamp — when the photo was taken, down to the second.
  • Camera make and model — the device used.
  • Camera serial number (on some cameras) — a unique identifier that's the same across every photo from that device.
  • Camera settings — aperture, shutter speed, ISO, focal length.
  • Software — the OS version or photo editor used to process the file.
  • Orientation — which way is up. Often used by image editors to auto-rotate.
  • Thumbnail — a small embedded preview of the photo, generated at capture time.

Why it matters

EXIF data has legitimate uses. Photographers tag images with copyright info. Cameras embed orientation so phones display photos right-side-up. Mapping apps use GPS coordinates to show photos on maps of places you've been.

It also has problematic uses. A photo of a child posted on a public social network can reveal the family's home address through embedded GPS coordinates. A photo of a "selfie at home" posted to Twitter can be cross-referenced to identify someone's exact residence. The EXIF data persists when you save the file, when you re-upload it, when you email it — until something explicitly strips it.

Most major social networks (Facebook, Instagram, Twitter, LinkedIn) strip EXIF when you upload images through their apps. Many do not strip when you upload through the API or attach images to private messages. Even when they strip server-side, the file you originally uploaded still exists in your own device's record. Email attachments preserve EXIF. Cloud storage preserves EXIF. Image-hosting sites usually preserve EXIF.

How to check what's in a photo

Before stripping, check what's actually there. Use any of:

  • Right-click in Windows Explorer → Properties → Details tab. Shows the most common fields.
  • Cmd+I in Mac Finder → More Info. Shows camera and dimensions but hides GPS by default.
  • Pictoolkit's EXIF viewer — shows everything, runs entirely in your browser, doesn't upload the file.
  • Command-line tools like exiftool for power users. exiftool photo.jpg dumps every field.

The browser-based viewer is the quickest path. Drop a photo, see what's in it, decide what to strip.

How to strip EXIF data

The complete-strip approach

The simplest option: remove everything. The image's pixel data is untouched; only the metadata is cleared. The file size shrinks slightly (usually 5-100 KB depending on what was there).

Use pictoolkit's EXIF tool — drop a photo or batch of photos, click "Strip all metadata", download cleaned files. Conversion happens in your browser; the original files never leave your device.

This is the right approach for personal photos you're sharing publicly.

The selective approach

Sometimes you want to keep some metadata. Photographers often want to preserve copyright info but strip GPS. To selectively strip, use a tool that lets you pick fields:

  • Adobe Lightroom and Photoshop — Export panel includes metadata-stripping options.
  • exiftool — surgical control. exiftool -gps:all= photo.jpg removes only GPS data, leaving everything else.
  • Specialized GUI tools like Adobe Bridge or PhotoMechanic.

Mobile options

On iPhone, the easiest way to strip GPS from a specific photo:

  1. Open the photo in Photos
  2. Tap the info icon (i in a circle)
  3. Tap Adjust next to the location
  4. Tap No Location

This removes GPS but leaves other EXIF. To strip everything, the easiest path is sharing the photo through the screenshot tool or saving to a third-party app that strips metadata.

On Android: many third-party gallery apps (Simple Gallery, etc.) have a "remove metadata" option in the share menu. The stock Google Photos app does not strip metadata; you have to use a separate tool.

What stripping doesn't fix

Removing EXIF does not anonymize the image content itself. Visual identifiers are still there:

  • Reflections in eyes, windows, or shiny surfaces can reveal location.
  • Background landmarks — a recognizable building or store sign.
  • Sensor noise patterns — every camera sensor has a unique noise signature that can identify which device took a photo, even after metadata is stripped (though this requires forensic analysis).
  • Editing artifacts — Photoshop's "Generative Fill" sometimes embeds AI traces that can be detected.

For most people, stripping EXIF is sufficient. For situations requiring stronger anonymity (protest photos, whistleblower documents), use a tool that strips EXIF and re-encodes the image to remove sensor patterns, or use a fresh anonymous camera.

A privacy checklist for sharing photos

  1. Check the EXIF data before sharing. You'd be surprised what's there.
  2. Strip all metadata for photos shared publicly (social media, forums, public blogs).
  3. Strip GPS for photos sent to acquaintances (work, school, mild acquaintances).
  4. Keep full metadata for photos in your own archive (you may want to find them by location later).
  5. Be cautious about photos taken at home, even the "boring" ones — they all have the same GPS tag.

Strip EXIF in your browser with pictoolkit's metadata viewer. View first, then decide what to remove — all without uploading your photos anywhere.

Keep reading

Related articles