Open any photo from your phone in a metadata viewer and you'll see something most people don't realize is there: your exact GPS coordinates, the camera's make and model, the lens, the focal length, the aperture, the shutter speed, the ISO, the orientation, the time, and — depending on the device — a unique serial number that follows the camera around for life.
That data isn't visible in the image. It travels with the image, embedded in a section of the file called EXIF (Exchangeable Image File Format). Every camera writes it. Every social platform reads it. Most platforms strip it before public display, but the rules are inconsistent, and the file you send to a friend over text or AirDrop is the original — fully tagged.
Why this matters more than people think
A few of the practical scenarios where EXIF leaks have caused problems:
- Doxxing from a single photo. A 2012 case put John McAfee's location on a map after a journalist published an iPhone photo with GPS coordinates intact.
- Theft via real-estate listings. Robbers have used metadata in listing photos to confirm what's inside a home and when it was last photographed.
- Sources outed in journalism. Photos sent to reporters for protection have, on more than one occasion, included the exact GPS where the source took them.
- Stalkers using social posts. A vacation photo that the platform forgot to strip can pinpoint a hotel within a few meters.
The point is not that EXIF is evil. It's that it's silent. You don't see it. You can't tell from looking whether a given photo has GPS in it. And the friction of finding out has, historically, been higher than most people are willing to spend per photo.
What's actually inside
A typical iPhone JPEG includes some or all of the following:
- GPS — latitude, longitude, altitude, direction the camera was pointing
- DateTime — when the shutter fired, down to the second
- Make/Model — Apple, iPhone 15 Pro
- Lens info — focal length, aperture, exposure
- Software — the OS version that wrote the file
- UniqueImageID — a per-device identifier in some firmwares
- Embedded thumbnail — a small JPEG inside the JPEG, sometimes outdated relative to edits
- XMP — a separate metadata block used by Photoshop and Lightroom
- ICC profile — color space info
- C2PA Content Credentials — increasingly written by Photoshop AI, ChatGPT image, and Midjourney
Each of those is its own little block, written by a different stage in the pipeline (camera, OS, editor, AI tool). Stripping them all by hand takes a tool. Doing it well is rarer than it sounds.
How to strip it in your browser
Drag the photo into Metadata Cleaner, and the file gets re-encoded through a fresh canvas — no embedded blocks come out the other side. The pixels are essentially unchanged at any resolution a human can see; the metadata is gone. The clean file lands in your Downloads folder, and the original is untouched.
This works for JPEG, PNG, and WebP. The processing happens entirely in your own browser — the file never gets uploaded anywhere. Close the tab and there's no record of the file having existed.
What this does not solve
- Operating-system file metadata. The "Created" and "Modified" dates you see in Finder or File Explorer come from your filesystem, not the file content. They get reset by your OS when the cleaned file is saved.
- The original. Stripping a copy doesn't strip the original. If the original lives in your iCloud Photos or Google Photos library, those services still have the EXIF.
- Social-network re-uploads. Some platforms strip metadata, others re-encode and add their own. Cleaning before upload covers your end of the chain regardless.
The 30-second habit
The easiest version of this is a habit, not a tool. Before you post or share anything you didn't take with the express intention of broadcasting your location:
- Drop it in Metadata Cleaner
- Hit Clean
- Use the cleaned file from Downloads instead of the original
That's it. No app to install, no account to create, no upload. Once you've done it three times it's faster than typing the message you're about to send.
If you do this often, the Chrome extension puts a "Strip Metadata & Download" item in your right-click menu, so you can clean any image on any webpage in one click.
The whole reason this product exists is that EXIF lived in the dark for thirty years and most people had no idea what was riding in their photos. The fix is one drop and one click.