EXIF Stripper
Remove EXIF, GPS, camera, software, and XMP metadata from JPEG, PNG, WebP, HEIC. Files auto-deleted after 15 minutes.
Reviewed by Aygul Dovletova · Last reviewed
How to Use the EXIF Stripper
- Drop your photo into the upload area. JPEG, PNG, WebP, and HEIC inputs are all accepted. Files up to 100 MB go through in a single request.
- Review the metadata categories the strip will remove. EXIF (camera, lens, ISO, shutter), GPS (latitude, longitude, altitude), software tags, XMP and IPTC sidecars, and embedded thumbnails are all in scope.
- Click Strip metadata. The pixel data is unchanged; only the metadata blocks are dropped. The operation runs on our EU servers.
- Download the clean file. The download URL is signed and valid for 15 minutes; after that the input and the output are both deleted.
Why EXIF Is Worth Removing
Every photo from a modern phone or camera ships with an EXIF block - a structured table of tags that describe the conditions of the capture. Tags like GPSLatitude, GPSLongitude, DateTimeOriginal, Make, Model, LensModel, Software, and Artist are routine. They are useful inside a photo management app, where the data drives map views and lens-based filters. They become a privacy problem the moment the photo leaves that managed environment - posted on a forum, attached to an issue tracker, shared in a chat, used as a profile picture. A geotag pins a home address to a few metres; a timestamp builds a schedule; a software string fingerprints the device down to a build number. Social platforms vary wildly in how much they strip on upload, and even when they strip the public copy, the original often sits in a "raw upload" bucket with metadata intact. Stripping before upload eliminates the ambiguity.
The Thumbnail Trap
An EXIF JPEG also typically embeds a small (160 px-ish) full-colour thumbnail used by photo apps for fast scrolling. This thumbnail is written when the photo is first captured and is not regenerated when the main image is edited. So a photo where the user blurred out a face in Photoshop and re-saved as JPEG can still leak the original unblurred face through the EXIF thumbnail. Specialised image viewers reveal this routinely; a generic browser viewer does not, which is why most people never notice. The EXIF stripper removes the thumbnail along with the rest of the metadata block.
Common Stripping Scenarios
- Cleaning vacation photos before uploading to a public Reddit thread or Imgur album.
- Removing the home GPS coordinates from a real estate listing photo taken inside an apartment.
- Stripping a photo used as a dating app profile picture so a screenshot reposted elsewhere cannot reveal location.
- Cleaning screenshots of a colleague's whiteboard where the camera EXIF would identify the device model.
- Submitting evidence photos to a public document drop where the timestamp would compromise the source.
- Publishing photojournalism where the EXIF software string would identify a particular newsroom workflow.
- Sharing wedding photos in a private cloud album where the host might index EXIF for analytics.
What This Tool Keeps and What It Drops
The strip-exif operation drops every metadata sidecar block the encoder recognises - EXIF, XMP, IPTC, PNG tEXt/zTXt/iTXt/eXIf chunks, and the embedded thumbnail. The only metadata it explicitly keeps is the ICC colour profile, because dropping a colour profile silently desaturates wide-gamut photos on a Display P3 screen and that is a different bug from the privacy issue we are fixing. If you want the colour profile removed too (rare but valid for sRGB-only output pipelines), run ImageMagick locally with magick mogrify -strip *.jpg, which drops both metadata and ICC.
Privacy and Operational Notes
Files are processed on EU servers; both the upload and the cleaned output are deleted from disk 15 minutes after they are created. Signed download URLs expire when the file is removed; nothing is cached longer. The pipeline does not log image content or metadata values, only request shape (op name, file size, duration) for monitoring. Typical run time is under a second on a 12-megapixel photo because the operation is mostly I/O - read the file, drop the metadata atoms, write the file back. HEIC inputs are slower because the container has to be re-encoded; HEIC output is transcoded to JPEG (also stripped) because most browsers cannot display HEIC directly.
Verify the Strip Worked
After downloading the clean copy, run the original and the result through the Image Metadata Viewer. The viewer parses EXIF in the browser without uploading and shows you exactly which tags survived. A clean output shows only essential format markers and the ICC profile - no GPS, no timestamps, no camera model, no embedded thumbnail. If you want a second-line check, ExifTool on the command line is the canonical inspector: exiftool clean.jpg should list only the file system and basic format tags.
Frequently Asked Questions
Why is removing EXIF a privacy issue?
EXIF stores GPS coordinates, the exact moment the photo was taken, the camera serial number, the lens model, the smartphone software build, and sometimes the user's name (the <code>Artist</code>/<code>Copyright</code> tags filled in by photo apps). A casually shared photo with intact EXIF can pinpoint someone's home, schedule, and device fingerprint. Strip it before uploading anywhere public.
Does the tool also remove the embedded thumbnail?
Yes. EXIF JPEGs often ship with an embedded full-colour thumbnail that is a low-resolution snapshot of the original. This thumbnail is not updated when the main image is edited (crop, blur, paint over), so a "blurred face" photo can leak the unblurred face via the thumbnail. Stripping metadata removes the thumbnail.
What about IPTC and XMP - are those removed too?
Yes. The strip-exif operation drops every metadata sidecar block the encoder recognises: EXIF (camera info), IPTC (newsroom captions and keywords), XMP (Adobe metadata), and PNG ancillary chunks (tEXt, zTXt, iTXt, eXIf). The only metadata kept is the ICC colour profile, which is a colour management concern rather than a privacy concern.
Will my photo look any different afterwards?
No. The pixel data is unchanged. The operation reads the source, strips the metadata sidecars, and re-writes the file with the same pixels. File size drops by the size of the metadata block - typically tens of kilobytes for a JPEG with a thumbnail, more for a heavily tagged image.
Why is the file smaller after stripping?
EXIF blocks, embedded thumbnails (often a 160 px JPEG of the original), and XMP sidecars can add 30 to 200 KB to a photo without the user noticing. Some social platforms strip EXIF automatically for privacy; many do not. Stripping it yourself before upload guarantees the destination cannot see it even if it forgets to.
Does this also remove the colour profile?
No - ICC profiles are kept. The colour profile tells a renderer how to interpret the pixel values; removing it would silently desaturate wide-gamut photos on Display P3 screens. EXIF and colour profiles are separate concerns, so a stripped photo still shows accurate colours after upload.
HEIC support - what happens to the metadata there?
HEIC stores EXIF inside the file container as a separate item; the stripper removes that item and re-encodes a clean copy. Note that we transcode HEIC to JPEG when delivering the response because most browsers cannot display HEIC directly - the JPEG output is also metadata-stripped.
Does the tool log anything about my photo?
No. The processing pipeline writes a temporary file, calls the strip operation, writes a temporary output, hands it to the user via a signed URL, and deletes both within 15 minutes. The only thing logged server-side is the request shape (op name, file size, duration) for monitoring - no image content, no metadata fields.
Can I see what metadata was in the photo before stripping?
Yes - use the <a href="/tools/image-metadata-viewer/">Image Metadata Viewer</a> tool first. It parses and shows the EXIF table in your browser without ever uploading. Then run this stripper to produce the clean copy.
More Image Tools
Base64 to Image Converter
Decode a Base64 string or data URL back into a viewable image and download it as PNG, JPG, WebP or GIF. Runs in your browser.
Open toolFavicon Generator
Generate favicons in all standard sizes (16x16 to 512x512) for websites and PWAs.
Open toolImage Blur & Pixelate
Apply blur or pixelation effects to images with adjustable intensity.
Open toolImage Color Picker
Upload an image and pick colors in HEX, RGB, and HSL with a visual color history.
Open toolImage Compressor
Compress images by adjusting quality to reduce file size without losing visual clarity.
Open toolImage Cropper
Crop images with preset aspect ratios like 1:1, 16:9, and 4:3 using a visual editor.
Open tool