Every modern smartphone photo carries 50-plus metadata fields by default. Most people know about GPS. The rest is more revealing than you'd think — and it doesn't all go away when you delete the GPS coordinates.

Take any photo from your phone. Right-click. View properties or open in any image inspector. You will see, at minimum, a few dozen pieces of metadata that the camera silently embedded the moment you tapped the shutter. A modern iPhone or Pixel photo can carry 200+ EXIF fields without you ever realising they exist. Most of those fields are technical and harmless. Some of them are surprisingly revealing.

This article walks through the four major categories of EXIF metadata, what each one leaks, where stripping fails, and which platforms preserve which fields when you upload. It's written for the journalist scrubbing photos before publication, the real-estate agent posting property listings, the parent posting school-pickup photos — anyone whose photos travel through channels where they don't fully control the audience.

The four categories of EXIF data

EXIF (Exchangeable Image File Format) was standardised in 1998 as a way for cameras to store information alongside the image data. Modern smartphones extended it with GPS, gyro/orientation, computational photography parameters, and software-edit trails. The data falls into four broad categories:

  1. Capture data. Shutter speed, aperture, ISO, focal length, white balance, flash usage, exposure compensation. The technical settings of the photograph.
  2. Device data. Camera make, model, firmware version, sometimes a unique device serial number. On smartphones, the model is usually clear enough to identify the phone generation.
  3. GPS data. Latitude, longitude, altitude, GPS timestamp, sometimes heading and accuracy. The "obvious" leak.
  4. Software and ownership data. What software last edited the file (Adobe Photoshop CS6, Lightroom, iOS Photos), edit timestamps, sometimes an owner name configured in the camera, sometimes copyright text.

Each category leaks something different, and most people only know about the third. The rest are quieter and sometimes more identifying.

GPS — the obvious one, but worth restating

Almost every smartphone embeds GPS coordinates in every photo by default. iPhone and Android both ship with this on. The coordinates are typically accurate to within 5-15 metres outdoors and somewhat less indoors (where the phone falls back on wifi-positioning).

Real-world consequences when someone forgets:

The fix for GPS is well-known: strip it. The trouble is that "strip GPS" is incomplete, because GPS information sometimes lives in more than one place in the file (more on this below).

Capture data — surprisingly identifying

Camera make, model, lens, and serial number combine into a fingerprint that's stronger than most people realise. Two photos with the same serial number provably came from the same physical device. This has been used in:

For most users, the practical risk from device metadata is the linkability. If your "personal Instagram camera" matches the "anonymous tip photo," that's a problem. Strip the device fields when posting anything you want unlinked from your identity.

Software trails — the long memory

Every time you edit a photo, the editing software stamps itself into the EXIF. "Adobe Photoshop CS6 (Windows)" persists in the file as the "Software" field. Lightroom adds its own edit history. iOS Photos quietly records that the file was modified by iOS Photos and when.

What this leaks:

Software metadata is the easiest to forget because most stripping tools focus on GPS and don't always touch the XMP packet. Verify after stripping.

Ownership data — sometimes there's a name

Many cameras allow setting an "owner name" or "copyright" field that gets baked into every photo the camera takes. DSLR users often configure this. Smartphone users rarely do, but professional camera apps sometimes set it automatically.

What this looks like in practice: a photographer configures their camera owner-name as "John Smith Photography" once, ten years ago, and then every photo from that camera carries that string. If they later post anonymously, the EXIF identifies them by name in the file. Same for "Artist," "Copyright," and "ImageDescription" fields that some camera apps populate from user settings.

Less common but worth knowing: Adobe Lightroom's XMP sidecar files can carry the photographer's full contact information if they've set up their identity plate. The sidecar travels alongside the JPG if exported as a bundle.

Where EXIF survives stripping

This is where "I removed EXIF" goes wrong in practice. Several places where metadata persists after a naive strip:

The defensive strip is: main EXIF + thumbnail EXIF + XMP + IPTC + maker notes, then rename the file to something generic, then verify with a fresh metadata viewer that all four are gone.

Which platforms strip metadata on upload (and which don't)

Major platforms vary widely in their default behaviour. Tested across multiple uploads from a metadata-rich source file:

The rule: assume metadata is preserved unless you're certain the platform strips. Strip locally before uploading anywhere you'd be unhappy seeing the metadata exposed.

Tool walkthrough

The EXIF stripper processes the photo entirely in your browser — the image bytes never leave your device. Before stripping, the tool lists every metadata field it finds (often surprisingly long — a recent test on a routine iPhone photo enumerated 387 distinct EXIF/XMP/IPTC fields). The before/after comparison view shows exactly what gets removed.

The tool's defaults strip all four metadata systems plus the embedded thumbnail's metadata, which is the configuration that defeats almost all naive forensic checks. There's also a "preserve orientation only" option for cases where you need the image to display rotated correctly but want everything else removed.

For the related concern of file size, image compress reduces file size while optionally stripping metadata in the same pass. Useful for "upload a smaller photo with the EXIF gone" in a single step.

What this article isn't saying

Two important caveats:

Where to read further

Photos carry more than what's visible in the frame. The metadata is invisible to the human eye but plainly readable to any software that knows where to look — which today includes search engines, social platforms, forensic tools, and anyone with a free EXIF viewer. Worth a few seconds of stripping before sharing, especially for anything that touches an audience you don't fully trust.

← All articles