Your Photos Are Leaking Data: EXIF Metadata and Privacy
Every photo you take contains hidden metadata — GPS coordinates, device info, timestamps. Learn what EXIF data is, why it matters for privacy, and how to strip it before sharing.
Published February 9, 2026 · Updated February 9, 2026
A few years ago, a journalist published a photo of their home office on social media. Nothing sensitive was visible in the image itself — just a desk, a laptop, a coffee mug. But within minutes, someone in the replies had identified the journalist's exact home address. They hadn't recognized the room or the street outside the window. They'd simply downloaded the image and checked the EXIF metadata, which contained GPS coordinates accurate to within three meters.
This isn't an isolated story. It happens constantly, and the vast majority of people sharing photos online have no idea their images contain this kind of hidden data. Let's talk about what EXIF metadata is, exactly how much information it exposes, and — most importantly — how to protect yourself without making photo sharing a hassle.
What Is EXIF Data, and Why Is It in Your Photos?
EXIF stands for Exchangeable Image File Format. It's a standard that dates back to 1995, originally designed to help photographers track their camera settings. When digital cameras first became popular, photographers wanted to know what aperture, shutter speed, and ISO they'd used for each shot — information that was previously scribbled in notebooks. EXIF solved that by embedding the data directly into the image file.
The problem is that EXIF has grown far beyond camera settings. Modern smartphones embed an enormous amount of information into every photo you take, and most of it has nothing to do with photography:
- GPS coordinates — the exact latitude and longitude where the photo was taken, often accurate to within 3-5 meters. This is the big one. Your phone's GPS can pinpoint your location with enough precision to identify the specific room in a building.
- Altitude — yes, your elevation above sea level is recorded too, which in combination with GPS can literally identify which floor of a building you were on.
- Date and time — the exact moment the photo was captured, often down to the second. Plus the timezone, which reveals your approximate geographic region even if GPS is disabled.
- Camera make and model — "Apple iPhone 15 Pro Max" or "Samsung Galaxy S24 Ultra." This identifies your exact device.
- Camera serial number — a unique identifier for your specific device. This can be used to link photos taken by the same phone across different platforms, accounts, and contexts.
- Lens information — focal length, aperture, shutter speed, ISO sensitivity. Useful for photographers, irrelevant for privacy — but still present.
- Software — what app took the photo, and what app last edited it. "Photos 9.0" or "Adobe Lightroom 7.1."
- Orientation — which direction you were holding the phone.
- Thumbnail — a small preview image embedded in the EXIF data. This is particularly sneaky — we'll get to why in a moment.
- Unique image ID — a UUID assigned to the image file, which can be used for tracking.
- Copyright and author — if you've set your name in your camera or phone settings, it's embedded in every photo you take.
All of this data is invisible when you look at the photo. It doesn't appear on screen. But it's trivially easy to extract — literally a right-click → Properties on Windows, or a single command in a terminal. Anyone who has the file has the metadata.
Why This Is a Genuine Privacy Problem
Let me be concrete about the risks, because "privacy concern" can sound abstract until you see the specifics.
Your home address is in your photos
Think about the photos on your phone right now. How many were taken at home? Photos of your pet, your cooking, your kids, your living room setup, your new furniture. Every single one of those photos contains your exact home address in the form of GPS coordinates, assuming you haven't disabled location services for your camera.
Now think about where you share photos: social media, messaging apps, online marketplaces (selling furniture?), community forums, dating apps, review sites ("here's my meal at this restaurant"... taken from your home kitchen). Not all of these platforms strip EXIF data.
Your daily routine is documented
If someone collected several of your photos from different contexts — different social media accounts, a forum post here, a marketplace listing there — the timestamps and GPS coordinates paint a detailed picture of your routine. Where you are on Monday mornings. Where you eat lunch. Where you spend weekends. For stalkers, this is a goldmine.
The thumbnail problem is worse than you think
Here's something that genuinely catches people off guard: EXIF data typically includes a thumbnail preview of the image. This thumbnail is generated when the photo is first saved, and many editing tools don't update it when you make changes.
What does this mean in practice? If you take a photo that accidentally includes something sensitive — a license plate, an address on a piece of mail, your child's school name on a sign — and you crop it out before sharing, the uncropped original may still be visible in the EXIF thumbnail. You think you've removed the sensitive information, but it's still embedded in the file's metadata.
This has caused real problems. There have been cases of people selling items online, carefully cropping their photos to hide identifying details, only to have the uncropped thumbnails reveal their home's interior or location.
Device fingerprinting across accounts
Camera serial numbers and unique device identifiers create a permanent link between photos. If someone posts under a pseudonym on one platform and under their real name on another, matching EXIF device identifiers between photos from both accounts can reveal the connection.
Law enforcement uses this technique regularly (and legitimately). But so can doxxers, stalkers, and anyone else motivated to de-anonymize someone online.
Timestamps reveal more than you'd expect
Even without GPS data, precise timestamps can be revealing. If you post a photo with a timestamp showing it was taken at 2:47 AM on a Tuesday, that tells people something about your schedule. Combined with timezone information (which EXIF also stores), it narrows your location to a geographic band even without GPS coordinates.
Who Can Actually Access Your EXIF Data?
The short answer: anyone who has the image file. There's no encryption, no access control, no password protection. EXIF data is as accessible as the image itself.
Here's how easy it is to read:
- Windows: Right-click any image → Properties → Details tab. GPS, camera info, timestamps — it's all there.
- macOS: Open in Preview → Tools → Show Inspector → GPS tab.
- Command line:
exiftool photo.jpgdumps every field. Available on every platform. - Websites: There are dozens of free EXIF reader websites where you upload a photo and see all the metadata. (Which, ironically, means those websites now also have your geotagged photo.)
- Browser dev tools: Even in-browser JavaScript can read EXIF data from images using widely available libraries.
The barrier to entry is essentially zero. Anyone curious enough to Google "how to see photo metadata" can do it in under a minute.
What do social media platforms do?
This is where it gets nuanced. Major platforms have different approaches:
| Platform | Strips EXIF on upload? | But... |
|---|---|---|
| Yes | Instagram itself stores and uses your location data | |
| Twitter/X | Yes | Original file metadata accessible via data export request |
| Yes, from public view | Facebook retains and uses metadata internally for ad targeting | |
| Yes | Stripped from forwarded images | |
| Signal | Yes | Fully stripped, not retained |
| Telegram | Yes (in compressed mode) | Sends full file (with EXIF) if sent as "document" |
| Discord | Yes | Recently started stripping; previously preserved EXIF |
| iMessage | No | Full EXIF data preserved in sent images |
| No | Full EXIF data preserved in attachments |
The critical ones to watch: email and iMessage both preserve full EXIF data. Every photo you email or text via iMessage arrives at the other end with your GPS coordinates intact. Most people don't know this.
Cloud storage sharing is another risk. If you share a Google Drive or Dropbox link to a photo, the recipient downloads the original file with all metadata intact.
Forums, small websites, personal blogs, and many CMS platforms typically do not strip metadata from uploaded images. If you upload a photo to a WordPress site, a Discourse forum, or a small community platform, the EXIF data is almost certainly preserved and publicly accessible.
The safest assumption: unless you're posting to a major social media platform that you've verified strips EXIF data, your metadata is visible to anyone who downloads the image.
How to Actually Protect Yourself
Now that you understand the risk, here's how to mitigate it — starting from the simplest approach.
Step 1: Disable location tagging at the source
The single most impactful thing you can do is turn off GPS tagging in your camera app:
iPhone: Settings → Privacy & Security → Location Services → Camera → set to Never
Android (varies by manufacturer): Open Camera app → Settings (gear icon) → Location tags → Off
Google Pixel: Camera app → tap ∨ at the top → Settings → Location → Off
Samsung: Camera app → Settings → Location tags → Off
This prevents GPS coordinates from being embedded in future photos. It does not retroactively remove location data from photos you've already taken. Those existing photos still contain their original coordinates.
One consideration: some people find location tags useful for organizing their photo library (searching "photos taken in Paris," for example). If that's important to you, keep location tagging on but be diligent about stripping metadata before sharing. It's a reasonable trade-off.
Step 2: Strip metadata before sharing any photo
This is the belt-and-suspenders approach, and it's what we'd recommend for anyone who shares photos publicly. Before posting or sending any image, remove the EXIF data.
There are several ways to do this:
Method A: Convert the image format
Converting an image from one format to another — like JPEG to WebP, or HEIC to JPEG — typically strips metadata as a side effect of the conversion. The new file is a clean image without the original EXIF payload. This is the approach we recommend because you get two benefits at once: metadata removal and often a smaller file size.
Method B: Use a dedicated metadata removal tool
Command-line tools like exiftool can surgically remove metadata while keeping the image data untouched:
exiftool -all= photo.jpg
This is efficient but requires installing software and using a terminal — not practical for most people.
Method C: Re-export from a photo editor
Most image editing apps (Preview on Mac, Photos, GIMP, Photoshop) let you export an image without metadata. Look for options like "Remove personal information" or "Strip metadata" in the export dialog.
Method D: Use a browser-based converter (our recommendation)
This is the approach we'd suggest for most people because it combines convenience, privacy, and metadata removal in one step. With Fileza Image Tools:
- Open the Image Tools page in your browser
- Drop your photos onto the converter
- Select your output format (or keep the same format)
- Convert and download
The converted files are clean — no GPS, no device serial numbers, no timestamps, no thumbnails. And because Fileza processes everything in your browser using WebAssembly, your original photos (with all their metadata) never leave your device. This is the crucial difference from online metadata removal tools that require you to upload your geotagged photos to their server, which defeats the purpose.
Step 3: Verify the metadata is actually gone
Trust but verify. After stripping metadata, check the resulting file:
- Windows: Right-click → Properties → Details → confirm GPS fields are empty
- macOS: Open in Preview → Tools → Show Inspector → confirm no GPS data
- Online: Use an EXIF reader website on the cleaned file (not the original!)
This takes 10 seconds and gives you peace of mind.
Beyond Photos: Other Files That Leak Data
EXIF metadata is the most well-known privacy risk, but it's far from the only one. Many file types contain hidden metadata:
- HEIC/HEIF files — Apple's modern photo format contains the same EXIF data as JPEG, including GPS coordinates.
- TIFF files — full EXIF support, commonly used in professional photography.
- PNG files — limited metadata via text chunks, but can still contain creator info, timestamps, and software identifiers.
- WebP files — supports EXIF metadata. Don't assume WebP is automatically "clean."
- PDF documents — stores author name, creation/modification dates, software used, and sometimes the full revision history.
- Word documents (DOCX) — author, organization, revision history, comments (including deleted comments that are still embedded), editing time, and more.
- Excel spreadsheets (XLSX) — similar to DOCX, plus hidden sheets and named ranges.
- Video files (MP4, MOV, MKV) — GPS, timestamps, device info, and sometimes even ambient audio captured before/after the recording starts.
If you're privacy-conscious about photos, you should apply the same thinking to other file types you share publicly.
A Practical Privacy Checklist for Photo Sharing
Here's the workflow we'd recommend before sharing any photo publicly — whether on social media, a forum, a marketplace, or via email:
Ask yourself: does this photo need to be public? The most effective privacy measure is not sharing unnecessary photos in the first place. This isn't about paranoia — it's about being intentional.
Check the image for visible personal information — house numbers, street signs, car license plates, mail with your address, screens showing personal info, reflections in windows or sunglasses. These are separate from metadata but equally important.
Strip the metadata — convert the image using a browser-based tool like Fileza, or use your preferred method from the options above. This removes GPS, device IDs, timestamps, and thumbnails.
Verify the output — quick check that the exported file is clean. Takes 10 seconds.
Share the clean version, archive the original — keep your original (with metadata) in your personal archive where the location and timestamp data is useful for organizing. Share only the stripped version publicly.
This process adds maybe 30 seconds to sharing a photo. That's a tiny investment for meaningful privacy protection.
The Bottom Line
Photo metadata is one of those things that's invisible until it isn't — and by then, the damage is done. Your photos contain your home address, your workplace, your daily routine, your device identifiers, and a dozen other pieces of personal information that you'd never voluntarily post online. Yet every time you share an unstripped photo, that's effectively what you're doing.
The fix is straightforward: disable location tagging if you don't need it, strip metadata before sharing, and use tools that process your files locally rather than uploading them to someone else's server. It's not about being paranoid — it's about making an informed choice about what data you share with the world.
Your photos tell a story. Make sure it's only the story you intend to tell.