How to remove EXIF & GPS data from photos before sharing
Tomoda HinataTool author & maintainerPublished Apr 26, 202613 min read
Every smartphone photo embeds the device serial, lens, exposure, and — by default on iOS and Android — the precise GPS coordinates of the shot. Most major social platforms strip this metadata when re-encoding for display, but BlueSky, Discord original-quality uploads, direct messaging apps, and personal-blog uploads frequently do not. The fix is a one-click in-browser cleanup that removes every metadata block while leaving the pixels bit-identical.
Tools used in this guide
What exactly is EXIF, and what does it leak?
EXIF (Exchangeable Image File Format) is a metadata block embedded inside every JPG, HEIC, and TIFF a modern camera writes. Standard fields include: camera maker and model (Apple, Samsung), the exact lens (iPhone 14 Pro back triple camera 6.86mm f/1.78), exposure (1/120s, ISO 400), the device's serial number, the firmware version, the date and time to the second — and, by default on every phone shipped after 2010, the GPS latitude and longitude of where the shot was taken.
Why does EXIF GPS leakage actually matter?
Two famous cases set the precedent. In 2007, paparazzi located Vanessa Hudgens via GPS coordinates in a leaked photo. In 2012, John McAfee — fleeing Belize — was tracked to Guatemala when Vice magazine published a photo of him with the iPhone GPS still in the EXIF. Today the everyday risk is the same shape: forwarding a photo of your kids from your living room reveals your home address; posting an item-for-sale photo from a parked car reveals your route. The information is there even when you cannot see it.
Which platforms strip EXIF, and which do not?
Strip on display (and usually on the original too): Twitter/X, Instagram, Facebook, LinkedIn, Reddit. Keep some metadata or the whole block: BlueSky (the AT Protocol stores raw blob), Discord at 'original quality' option, most direct messaging apps (Telegram secret chat keeps it, Telegram cloud chat does not), most personal-blog CMSes (WordPress with the default media library keeps EXIF intact). Email attachments are unmodified — the recipient gets the full block.
How does the in-browser remover work?
The tool parses the JPG / HEIC / WebP / PNG container, walks the metadata segments (APP1 for EXIF, APP2 for ICC, the eXIf chunk in PNG), strips the EXIF block while leaving every other segment intact, and re-serializes. The pixel data is byte-identical — there is no re-compression, no quality loss, no risk of color shift. Optionally the tool can also strip ICC color profiles (rarely needed unless you are printing).
Should I just turn off the Camera GPS setting instead?
You should do both. Disabling GPS at capture time (iOS: Settings → Privacy & Security → Location Services → Camera → Never; Android: Camera app settings → Location tags → Off) prevents new photos from carrying GPS. But all your existing photos still have it — you need a one-time bulk cleanup of the back catalog. The tool batches up to 30 files at 80 MB each in the browser, perfect for a one-pass cleanup.
What is preserved vs removed?
Removed by default: every EXIF tag (GPS, camera, exposure, serial), the IPTC block (caption, copyright if you want them gone), the XMP block. Preserved by default: the pixel data (zero re-encoding), the ICC color profile (so colors print correctly), the image dimensions, the file format. Optional toggles let you also strip ICC, or keep selected EXIF tags like Orientation (which Android sometimes needs for portrait shots to display right-side up).
Steps
About 1 minDrop the photos
Drag up to 30 JPG/HEIC/WebP/PNG files (80 MB each) onto the tool.
Confirm defaults
EXIF/IPTC/XMP off, ICC on, pixels untouched. Override only if you have a specific reason.
Run the cleanup
Click 'Strip metadata'. Each file processes locally in milliseconds.
Download as ZIP
Download the cleaned files as a single ZIP — every file is byte-identical to the original except for the deleted metadata segments.
| Property | Original | After strip |
|---|---|---|
| File size | 4.18 MB | 4.05 MB |
| Pixel data SHA-256 | 8af2…c3e1 | 8af2…c3e1 (identical) |
| GPS coordinates | 35.6585° N, 139.7454° E | (removed) |
| Camera serial | F2LXG3HJYZ8N | (removed) |
| ICC color profile | Display P3 | Display P3 (preserved) |
Frequently asked questions
Will the photo look any different after EXIF removal?
No. The pixel data is bit-identical to the original — the tool only deletes the metadata segments around the pixels. There is zero re-compression and zero quality loss.
Do social media platforms already strip EXIF for me?
Most large platforms (Instagram, Twitter/X, Facebook, LinkedIn) strip EXIF when re-encoding photos for display. But BlueSky, Discord at 'original quality', personal-blog uploads, and email attachments do not. Strip locally before uploading anywhere you do not control.
Will I lose color accuracy if I strip EXIF?
No — color comes from the ICC color profile, which is a separate metadata block kept by default. Only turn off 'Keep ICC' if you have a specific reason.
Can I selectively keep some EXIF fields?
The default removes everything. Advanced mode lets you preserve specific tags like Orientation (sometimes required by older Android viewers to display portrait photos correctly).
Does this work on HEIC files from iPhone?
Yes. The tool parses HEIC's HEIF container and removes the EXIF block while preserving the HEVC pixel data unchanged.
Are my photos uploaded anywhere?
No. The entire process runs in your browser via WebAssembly. The photos never leave your device.
Try it now
Strip GPS and camera info from images
EXIF / Metadata Remover