← All guides

How to Remove Location Data and Other Hidden Metadata from Photos

privacyexifimagesmetadata

The photo you just took from your phone contains the photo. It also contains:

  • The exact GPS coordinates of where you stood when you took it
  • The time and date down to the second
  • The make, model, and lens of your phone or camera
  • Camera settings (exposure, ISO, focal length)
  • Sometimes the camera’s unique serial number
  • Software used to edit it (if you’ve touched it up)
  • Sometimes the photographer’s name (if your camera profile has one)

That bundle of information is called EXIF metadata, and it travels with the photo every time you share it. Email it to someone, post it on social media, attach it to a forum post, hand it off in any way that preserves the original file — the metadata goes with it.

Most of the time this is harmless. Sometimes it really isn’t. Here’s how to handle it.

What is EXIF?

EXIF stands for Exchangeable Image File Format. It’s a metadata standard that cameras (and phones, since they’re cameras) use to embed information about a photo inside the photo file itself. The image data and the metadata sit side by side in the same JPG file — when you open the image, your viewer reads the pixels and ignores the metadata. When you check the file’s “properties” or “info” in your OS, the metadata is what shows up.

A typical photo from a modern smartphone has these EXIF fields populated:

  • GPS Latitude / Longitude / Altitude — exact location to ~10 meters
  • DateTime Original — when the photo was taken
  • Make / Model — e.g. “Apple iPhone 16 Pro”
  • Software — OS version that took the photo
  • Lens Model — which lens was used (front camera, main, telephoto)
  • Exposure / Aperture / ISO / Focal Length — camera settings
  • Orientation — how the photo was held
  • Color Profile — color space info
  • Image Description — sometimes populated by AI features like “Live Text” or auto-captions

Older or fancier cameras may add:

  • Owner Name / Artist — if you configured the camera with your name
  • Camera Serial Number — uniquely identifies that physical camera
  • Lens Serial Number — uniquely identifies that lens

When EXIF matters

Most situations: it doesn’t. You text a sunset photo to a friend; nobody cares that the metadata says it was taken at 5:47 PM on a Tuesday with an iPhone 16 from coordinates 37.7749, -122.4194.

When it does matter:

Selling something online. You photograph an expensive item on your kitchen table for Facebook Marketplace, Craigslist, eBay. The GPS coords go up with the photo. Anyone looking at the listing can pull the coords and learn your home address. This has been a documented vector for targeted theft.

Posting photos of children. A photo of your kid at school, on a field trip, at the park — GPS coords reveal where they’re regularly located. A photo of your kid in your house’s backyard reveals your home address.

Activists, journalists, anyone who might be targeted. Photos taken at meetings, at protests, in safe houses — anywhere being at can imply something. GPS data tells the story.

Whistleblower or anonymous source situations. A leaked document photographed for a journalist can have the photographer’s camera serial number embedded. That’s been used to track sources before.

Online dating profile photos. A “casual” selfie can geolocate to your home or workplace. Strangers don’t need that.

Job applications with portfolio photos. A photographer or designer sharing portfolio work probably doesn’t want every client to learn where each photo was taken.

Selling a house. Photos for the listing might be fine to keep location-tagged (it’s the property after all), but interior shots that include personal items could reveal your name (from software metadata) or other details.

Social media in general. Most major platforms (Instagram, Facebook, Twitter/X, TikTok) strip EXIF on upload as a default. But not all do, and the protection isn’t always reliable. Email and direct messaging preserve EXIF.

How to remove EXIF

Use the EXIF Stripper. Drop in any image (JPG, PNG, WebP, HEIC, TIFF), and the tool re-saves it without metadata. The output is visually identical to the input — pixel-for-pixel the same image — minus everything in the EXIF fields.

The flow:

  1. Open the EXIF Stripper
  2. Drag in one or more images
  3. Click strip
  4. Download the cleaned versions

No upload, no signup. The metadata removal happens in your browser using the image processing pipeline. Output files have empty EXIF — anyone inspecting them sees that the data was intentionally cleared, not just that there’s no GPS info (which on its own can be suspicious).

What about file properties shown by Windows / Mac?

Both Windows and macOS have built-in “remove personal info” features:

  • Windows: right-click a JPG → Properties → Details tab → “Remove Properties and Personal Information” at the bottom
  • macOS: needs Preview app → Tools → Show Inspector → location info, then File → Export to a new copy with metadata stripped

These work, but they’re slow if you have many photos, and the macOS version is awkward. The browser tool is usually faster for batch work — drop in 20 photos at once, get them all stripped, done.

Removing GPS without removing everything else

Sometimes you want to keep the date the photo was taken (for organization) but lose the GPS. This is harder than full stripping — most basic tools remove all metadata or none.

The EXIF Stripper does a full strip by default. If you specifically want a selective strip:

  • Windows’ “Remove Properties” lets you pick which to remove
  • Free desktop tools like ExifTool (command-line) allow fine-grained control

For most privacy purposes, full strip is what you want. The few extra fields you’d lose (date, camera model) aren’t usually sensitive on their own.

Does removing EXIF make my photo “anonymous”?

No, just less identifying. The image content itself can still identify locations (recognizable buildings, street signs, distinctive backgrounds), people (faces), and time-of-day (lighting, shadows). EXIF stripping removes the easy machine-readable signals; it doesn’t anonymize the image.

If you need true anonymity, beyond EXIF you’d also want to:

  • Blur or crop identifying parts of the image
  • Avoid sharing distinctive contextual details that could be matched (e.g., your unique living room)
  • Be aware of reverse image search — a clear image can be reverse-searched on Google or TinEye, and the original (with all metadata) found elsewhere

For most people the bar isn’t “true anonymity” — it’s “don’t carry my home address inside every photo I share.” Stripping EXIF clears that bar.

Sharing photos: a complete workflow

For sharing iPhone photos with someone outside the Apple ecosystem, while keeping things private:

  1. HEIC → JPG with the HEIC to JPG tool — universal format
  2. Strip EXIF with the EXIF Stripper — remove location data
  3. (Optional) Resize and compress with Image Resizer and Image Compressor — make the file emailable

All four steps run in your browser, total time under a minute even with a few dozen photos. Result: a JPG with no embedded location data, sized and compressed appropriately for sending.

What about adding fake EXIF to throw people off?

That’s possible (some tools let you set custom EXIF fields), but it’s almost always overkill. Stripping the real data is enough — there’s no value in pretending the photo was taken somewhere else, and forensic tools can usually detect altered metadata.

The exception: photographers who want to mark their work with a copyright/author field. That’s a positive addition rather than a deception, and you can do it through any photo metadata editor on desktop. The browser tool we have is focused on stripping, not adding.

Does this work on every image type?

JPG: yes, removes EXIF cleanly. PNG: yes, removes any embedded text chunks (PNGs use a different metadata mechanism but the principle is the same). WebP: yes. HEIC: removes the EXIF block; if you also want to convert to JPG, do that step after.

For TIFF (used in some professional contexts) and RAW files (DNG, NEF, CR2, ARW from cameras), the metadata structure is more complex and our tool handles the standard EXIF block. For deep professional metadata cleaning of RAW files, use ExifTool.

TL;DR

  • Photos from phones contain hidden GPS coordinates, time, device info — collectively called EXIF.
  • This is fine for most sharing but a real privacy issue for some situations.
  • Strip EXIF with the EXIF Stripper before sharing photos where location matters.
  • Most social media strips EXIF on upload, but email and direct sharing don’t.
  • Browser-based stripping; nothing uploaded.