EXIF Stripper
See what your photos reveal about you — GPS coordinates, camera model, exact timestamp — then strip it all. 100% in-browser. The file never leaves your device.
What is EXIF and why care?
Every photo you take with a phone or camera carries a chunk of hidden data — EXIF metadata — embedded in the file alongside the pixels. Most people never see it. It's there anyway: the GPS coordinates of where the photo was taken (often accurate to a few meters), the exact second on your phone's clock when the shutter fired, the make and model of your device, the lens, sometimes your name from the camera's owner field. Upload that JPG to a forum, send it on WhatsApp, post it to a personal blog, and that data goes with it unless the platform happens to strip it.
This tool reads EXIF directly in your browser (no upload — JavaScript on the page parses the bytes), shows you what's there, and offers a one-click download of the same photo with all metadata removed. The original file never leaves your device.
What actually gets exposed
- GPS coordinates. If location services were on when you took the picture, latitude/longitude are baked in. Six decimal places is roughly 11 cm of precision — enough to identify your home address.
- Date and time. Down to the second, in the camera's local timezone.
- Camera model + serial. Some cameras embed a unique serial that ties multiple photos to the same physical body.
- Lens, aperture, ISO, focal length. Useful for photographers; harmless to leak.
- Editing software. "Photoshop CC 2023" reveals that the image has been processed, sometimes with the editor's identity.
- Owner / artist / copyright fields. Some cameras let you set a default name. It travels with every photo.
When you should strip EXIF
- Before posting a photo of your home, workplace, or anywhere you don't want pinned on a map.
- Before sharing a "where I took this" picture publicly when you'd rather not reveal where you live.
- When sending photos to journalists, lawyers, support groups, or anyone in a sensitive context.
- Whistleblower / source-protection workflows — strip metadata before uploading any image evidence.
- When listing on a marketplace (eBay, Facebook Marketplace) — the photo of your couch could reveal your address.
What this tool does and doesn't do
- Does: Reads EXIF from JPG files. Shows you GPS, camera, timestamp, lens, software. Re-emits the JPG without any APP1 (EXIF), APP13 (Photoshop IRB / IPTC), or APP14 (Adobe) segments.
- Does: Run entirely in your browser. Nothing is uploaded. No server log of the file ever exists.
- Doesn't: Handle EXIF in RAW formats (CR2, NEF, ARW) — those need a desktop tool. PNG and WebP rarely carry EXIF.
- Doesn't: Strip metadata baked into the pixels (e.g. a visible timestamp burned into the image, or a watermark).
- Doesn't: Re-encode the JPG. Pixel data is byte-identical; only metadata segments are dropped, so quality is unchanged.
Common gotchas
- Social networks vary. Facebook and Twitter strip EXIF on upload; Instagram historically did too. But "image hosting" sites, forums, and personal blogs often don't. Treat every platform as untrusted unless you've tested.
- Screenshots usually have no EXIF. The tool will tell you if it's already clean.
- Cloud sync keeps the original. Stripping EXIF from a JPG you downloaded doesn't change the copy still sitting in iCloud / Google Photos.
- The thumbnail can survive. Some software stores a small JPEG preview inside the EXIF block; this tool drops the whole EXIF segment, so that preview goes too.