How to Remove EXIF and GPS Data From Photos Before Sharing
A photo your phone takes can include: GPS coordinates accurate to ~5 meters, the exact capture timestamp, camera serial number, lens used, editing software, and a thumbnail showing the original (pre-crop) image. Most of this travels with the photo when you email it, upload it, or share it. For sensitive contexts — selling something on a marketplace, posting from home, sharing a portrait — that's a privacy concern.
This article explains what EXIF data leaks, how to strip it without losing the photo, and how to do it browser-local so the file never leaves your device. Tool used throughout: paste-to-download.com/exif.
What's Actually in EXIF
A typical iPhone photo of a houseplant in your living room contains all of this:
Make: Apple
Model: iPhone 15 Pro
Lens: iPhone 15 Pro back triple camera 6.86mm f/1.78
SerialNumber: F5ABC123XYZ (uniquely identifies your specific phone)
DateTimeOriginal: 2026-05-14 14:23:18
GPS Latitude: 37.7749° N
GPS Longitude: 122.4194° W
GPS Altitude: 16 m
Software: Photos 9.0
ThumbnailImage: <a 160×120 preview, sometimes the original pre-edit version>
WhiteBalance: Auto
MeteringMode: Pattern
... (often 30-50 more fields)
The GPS coordinates alone, plus a map lookup, place the photo within a few meters of where you stood when you took it. The serial number, if leaked into multiple online accounts, can cross-link them. Even the thumbnail can be embarrassing — a cropped photo's thumbnail sometimes shows the un-cropped version.
Where EXIF Travels
Different platforms handle EXIF differently in 2026:
| Platform | EXIF on upload |
|---|---|
| Strips most, keeps some camera info | |
| Strips all | |
| X (Twitter) | Strips all |
| Strips all (since 2023) | |
| Strips all | |
| Slack | Preserves all |
| Preserves all (file is attached as-is) | |
| Google Drive / Dropbox | Preserves all (original file) |
| Marketplace (eBay, Craigslist, Marketplace) | Mixed — some preserve, some strip |
| Personal blogs / forums | Preserves all (raw file uploaded) |
| Your own backups | Preserves all |
The safe assumption: if it's not a major social network that auto-strips, your EXIF travels with the photo.
When You Should Strip EXIF
- Selling on Craigslist / Facebook Marketplace — buyers can pinpoint your home address from the listing photos
- Posting on forums / Reddit as a non-anonymous individual
- Sharing portraits of yourself or others where location matters (especially anything photographed at home)
- Sending photos to clients or strangers via email
- Whistleblowing / journalism — protect sources
- Activism in restrictive contexts where GPS data could identify protesters
- Real estate photos before publishing externally (camera serial linking your photography across listings)
When EXIF is Useful (Don't Strip)
- Your personal photo library — EXIF lets your photo app sort by date and map photos to locations
- Photo journalism / forensic photography — provenance is essential
- Professional photography for clients — clients often want shooting metadata
- Editing workflows — Lightroom and similar tools use EXIF to apply lens corrections
For your own archives, leave EXIF intact. Strip only when sharing externally.
Step 1: Check What's Embedded
Open /exif. Drop or paste your image. The viewer mode shows every metadata field. Look for:
- GPS section — if present, this is your top concern
- Serial number — uniquely identifies your camera/phone
- Thumbnail — may contain pre-edit version of the image
- Software / editing history — reveals editing pipeline
Step 2: Switch to Remove Mode
On the same page, switch to Remove mode. The tool now exports with metadata stripped.
Step 3: Choose Selectively (Optional)
The paste-to-download viewer lets you toggle:
- ☐ Keep capture date (useful for personal library organization)
- ☐ Keep camera make/model (some platforms want this for credibility)
- ☐ Keep orientation (otherwise some viewers display rotated)
Most users should: uncheck GPS, uncheck serial, uncheck thumbnail, keep orientation. Optional: keep capture date for personal use, drop it for fully anonymous sharing.
Step 4: Export the Cleaned Image
Click Strip & Download. The cleaned file is identical visually but with the chosen metadata removed. The original on your device is untouched — strip and re-strip until you have the version you want.
Step 5: Verify
Re-open the cleaned file in the same EXIF viewer. The fields you intended to remove should now be missing. If GPS is still showing somehow, the original may have had GPS in multiple sub-tags (uncommon but possible) — re-export with "strip all" mode for thoroughness.
Browser-Local: Why It Matters Here
An EXIF stripping tool that uploads your photo to its server is a privacy paradox. You're trusting an unknown third party to handle exactly the data you're worried about leaking.
paste-to-download.com/exif runs entirely in your browser tab. The EXIF parser and writer run as WebAssembly on your machine. Open DevTools → Network: zero outbound requests for image data. The stripped file is generated locally and downloaded directly.
Beyond EXIF: Other Privacy Concerns
EXIF is the most common but not the only leak vector:
- PNG can carry tEXt/iTXt chunks with embedded comments — usually strip-friendly
- JPEG comment fields are separate from EXIF
- XMP packets (used by Adobe) carry edit history and rights metadata
- ICC color profiles can occasionally embed identifying data
A comprehensive strip removes all of the above. The paste-to-download exif tool does this by default in "strip all" mode.
The TL;DR
Before sharing photos externally:
- Open /exif
- Check what's embedded
- Switch to Remove mode
- Export with metadata stripped
- Verify the cleaned file
All browser-local. Your photo never leaves your device. Especially valuable for marketplace listings, anonymous sharing, and any image with sensitive location data.