What Is Image Metadata? (And Why You Should Remove It Before Sharing)
Every photo you take contains hidden data: your GPS location, camera model, exact timestamp, and more. Here's what EXIF metadata is and how to strip it.
When you take a photo on a smartphone, you capture more than the image. Embedded invisibly in the file is a structured block of data — called EXIF metadata — that can reveal where you were, when you were there, and what device you used. Most people share images publicly without ever knowing this data exists.
What Is EXIF Data?
EXIF stands for Exchangeable Image File Format. It's a standard for storing metadata within JPEG, TIFF, and some PNG files, defined in 1995 and now universal across every camera manufacturer and smartphone platform.
Common EXIF Fields
- ●GPS coordinates — latitude and longitude accurate to within a few metres
- ●Timestamp — exact date and time, sometimes including timezone offset
- ●Camera make and model — e.g., "Apple iPhone 15 Pro" or "Sony ILCE-7M4"
- ●Lens information — focal length, aperture, shutter speed, ISO
- ●Software version — firmware or editing app used
- ●Copyright and artist — fields that may contain your name or studio
- ●Thumbnail — an embedded preview that may differ from the edited main image
The GPS tag doesn't just capture public locations. Photograph a letter on your kitchen table and the EXIF data records your home address to within five metres.
Real-World Incidents Caused by EXIF Data
- ●In 2012, John McAfee's location while evading police was revealed by GPS coordinates embedded in a journalist's photo.
- ●Journalists sharing photos of sensitive documents have repeatedly exposed their physical location through EXIF data.
- ●Online sellers photographing items at home inadvertently share their address with every image listing.
- ●Whistleblowers who photograph internal documents without stripping metadata have been identified through device fingerprinting.
Who Can Read EXIF Data?
Most social platforms (Instagram, Facebook, X) strip EXIF server-side before public display. Many do not, including: WhatsApp direct messages, Telegram file sends, Discord uploads, email attachments, and any image hosted directly on a web server. Even when platforms strip public-facing EXIF, they often retain it internally.
How to View Your Image's EXIF Data
// Read EXIF data in-browser without uploading anything
import { parse } from 'exifr';
const file = document.querySelector('input[type=file]').files[0];
const exif = await parse(file, { gps: true, all: true });
console.log(exif);
// {
// Make: 'Apple',
// Model: 'iPhone 15 Pro',
// latitude: 51.5074,
// longitude: -0.1278,
// DateTimeOriginal: 2026-04-01T09:23:11.000Z,
// Software: '17.4.1',
// ...
// }How to Strip EXIF Data
- 1.Browser-based tool — fastest for occasional use; no upload required if client-side
- 2.ImageMagick CLI —
convert input.jpg -strip output.jpg - 3.ExifTool — the definitive metadata editor:
exiftool -all= input.jpg - 4.macOS Preview — Export → uncheck "Include Metadata"
Our metadata removal tool strips all EXIF, IPTC, and XMP data from JPEG and PNG files entirely in your browser — photos never leave your device.
Ready to try it?
All tools run entirely in your browser — no uploads, no account required.
Remove Metadata