How-To & Life · Guide · Audio, Video & Voice
How to Remove EXIF Metadata From Photos
What EXIF stores (GPS, camera, time), privacy risks, lossless stripping, and when keeping EXIF is useful.
Every photo you take records hidden metadata called EXIF: camera model, shutter speed, ISO, the exact GPS coordinates where the shot was taken, the date and time down to the second, and sometimes the serial number of the device. Most of this is useful for photographers and catastrophic for privacy. Share a phone photo with someone online and you may have shared your home address. Removing EXIF before publishing is a one-click habit that every creator should pick up, and the stripping can be done without touching a single pixel of the image itself. This guide covers what EXIF contains, when to strip it, and when keeping it matters.
Advertisement
What’s actually in an EXIF record
EXIF (Exchangeable Image File Format) is a standard metadata block attached to JPEG, TIFF, and increasingly WebP/HEIC files. A typical record includes:
- Camera make and model (e.g. Apple iPhone 15 Pro)
- Lens make and model, focal length, aperture
- Shutter speed, ISO, exposure compensation
- Date and time of capture, sometimes with timezone
- GPS latitude, longitude, and altitude — often precise to a few meters
- Orientation tag (rotation hint for display)
- Device serial number (on some cameras)
- Artist/owner name if configured in-camera
- Software used to process the file (Lightroom, Photoshop, filter apps)
Why privacy matters here
GPS coordinates are the big one. A parent posts their kid’s first-day-of-school picture; the EXIF says latitude 40.748847, longitude -73.985368, and anyone who reads the metadata now knows the family’s home or the child’s school. Real-estate scammers, stalkers, and casual creeps all know to check this.
Timestamps are the second risk. Combined with other public info, an “I’m working from Paris today” post with an EXIF timestamp from 6 hours ago Paris-time verifies someone’s location and schedule more precisely than they’d like.
Which platforms strip EXIF and which don’t
Don’t rely on platforms to protect you — behavior varies:
- Instagram, Facebook, Twitter/X, LinkedIn: strip most EXIF on upload, including GPS.
- WhatsApp: strips most EXIF from photos; forwarded “document” files may not be stripped.
- Email attachments: usually untouched.
- Personal websites and blogs: untouched unless the CMS explicitly strips.
- File transfer services (Dropbox, iCloud): untouched.
- Image boards and forums: varies widely.
The safe habit: strip before upload, every time.
Lossless stripping
Removing EXIF does not touch the pixel data. Good tools edit only the metadata blocks; the image itself is byte-identical in its pixel representation, and JPEGs stay at their original compression quality. A file will typically shrink by a few KB (sometimes tens of KB if a full-resolution thumbnail preview is stored).
Avoid tools that “strip EXIF” by re-saving the JPEG, which re-encodes and loses quality. A dedicated EXIF tool should be a metadata-only operation.
The Orientation tag trap
When you strip EXIF, the Orientation tag goes with it. If the image was a sideways pixel buffer relying on the tag for upright display, it will now show sideways everywhere. The fix: rotate the pixels physically first, then strip the tag.
Good EXIF strippers detect the Orientation tag, bake the rotation into the pixels, then strip. Bad ones strip blindly and leave you with sideways photos.
What else gets stripped
Beyond EXIF, photos often carry:
- IPTC — caption, keywords, copyright, authorship (popular with news and stock).
- XMP — Adobe’s extended metadata (edit history, ratings, keywords).
- ICC profiles — color space description.
- Thumbnail previews — small copies embedded inside the file.
Most strippers clear EXIF, IPTC, and XMP together. Keep the ICC profile unless you know the destination handles missing color info gracefully — colors can shift visibly if you strip the profile and the viewer assumes sRGB when the source was Adobe RGB.
Batch stripping workflows
For bulk jobs — entire photo libraries before sharing, all the vacation pics before uploading to cloud storage — batch strippers process hundreds of files in seconds. Look for:
- Recursive folder support.
- Filter by type (JPEG only, skip RAW).
- Keep-originals option (write output to a separate folder).
- Orientation-safe mode.
- Selective strip (keep copyright, remove GPS).
When EXIF is useful to keep
Not every use case demands full stripping:
- Professional photography portfolios: camera, lens, settings are part of the content and interested visitors read them.
- Photo journalism: timestamps and sometimes GPS are evidence of when and where a photo was taken.
- Insurance and legal claims: capture metadata can matter as proof.
- Personal photo library organization: dates and GPS drive map and timeline features.
- Scientific imagery: capture parameters are part of the data.
For these cases, strip only GPS and author fields before public sharing; keep the rest.
Selective stripping
The safest middle ground is selective stripping: remove GPS and author name, keep everything else. Most advanced EXIF tools offer per-field control.
Remove: GPSLatitude, GPSLongitude, GPSAltitude,
GPSTimeStamp, Artist, OwnerName,
CameraOwnerName, SerialNumber
Keep: Make, Model, ExposureTime, FNumber,
ISO, DateTimeOriginal, ICC profileThis balance keeps the photographic craft visible and the personal data private.
Verify after stripping
Don’t trust — verify. After running the strip, open the file in an EXIF viewer and confirm the sensitive fields are actually gone. A tool that claims to strip but leaves a GPS field somewhere is worse than no tool at all because it builds false confidence.
Running a file through two different strippers occasionally exposes what one missed. For sensitive content, belt-and-braces is fine.
Operating system quick-strip options
Some operating systems offer basic EXIF stripping without a dedicated tool:
- Windows: right-click a file, Properties, Details tab, “Remove Properties and Personal Information.” Works on a per-file or whole-folder basis.
- macOS: Preview’s “Export” with the “Keep metadata” checkbox unchecked strips most fields. For GPS specifically, Photos app’s “Image > Location > Hide Location” works before export.
- iOS: when sharing, tap “Options” at the top of the share sheet and toggle off “Location.”
- Android: varies by OEM; Google Photos has a “Remove geolocation” per-file option.
These built-ins handle the common cases. Dedicated tools still beat them for batch work and selective stripping.
Legal and journalistic considerations
For journalism, never strip EXIF from evidence photos without a clean copy retained for source verification. The metadata is often the difference between “this claim is credible” and “we can’t verify this.” Keep originals; publish stripped derivatives.
For legal discovery, metadata is part of the document and stripping it can itself be an issue. Consult counsel before bulk stripping anything related to litigation.
Common mistakes
Stripping EXIF with a tool that re-encodes the JPEG, silently losing quality. Stripping without baking orientation and ending up with sideways photos. Trusting a social platform to strip when it strips some fields but not all. Forgetting that the strip only applies to the current file — if you share the original HEIC from your phone later, you’re back to square one. And the subtle one: some privacy-conscious users strip EXIF but leave the filename “IMG_20250810_142355.jpg”, which still leaks the capture date. Rename files too for full hygiene.
Run the numbers
Our EXIF remover performs a lossless metadata strip, bakes orientation safely, and offers selective-keep for fields that are legitimately useful. To confirm the result, the EXIF viewer shows exactly what’s in any file. And for a privacy pass that also reduces file size, run stripped files through the image compressor afterwards.
Advertisement