How to Remove EXIF Data From Photos: The Complete 2026 Guide

By Hieu Dinh

How to Remove EXIF Data From Photos: The Complete 2026 Guide

EXIF — short for Exchangeable Image File Format — is the metadata standard your camera writes into every JPG, HEIC, RAW, or TIFF file the moment you press the shutter. It records the camera make, model, lens, ISO, shutter speed, aperture, white balance, focal length, and (when GPS is enabled) the precise latitude/longitude/altitude where the photo was taken.

For photographers learning their craft, EXIF is gold. For anyone publishing photos online, it is a privacy liability. This guide is the technical reference for how to remove EXIF data cleanly across every platform — Mac, Windows, iPhone, Android, command line, and online — including how to verify the strip actually worked, since not all tools strip everything.

If you are looking for a higher-level overview that covers EXIF, IPTC, XMP, and embedded thumbnails together, see remove metadata from photo. If you want to see EXIF before stripping, see our EXIF viewer guide. This page is specifically about the EXIF block.

What's in EXIF that matters

A typical iPhone or DSLR photo carries 50–100 EXIF tags. The privacy-relevant ones:

TagPrivacy risk
GPSLatitude / GPSLongitude / GPSAltitudePinpoints location to ~5 m. Highest risk.
GPSTimeStamp / GPSDateStampConfirms when AND where.
DateTimeOriginalExact capture timestamp, often to the second.
Make / ModelIdentifies device class.
SerialNumber / LensSerialNumberTies photos across accounts to the same physical camera.
InternalSerialNumberSub-component fingerprint.
OwnerName / Artist / CopyrightDirect identity if filled.
HostComputeriPhone name (e.g., "Jane's iPhone").
SoftwarePhotoshop, Lightroom, Snapseed — reveals editing pipeline.
ProcessingSoftwareSame.

Less-obvious risks:

  • Embedded thumbnail — many cameras embed a small JPEG of the original frame in EXIF. If you crop a photo and only the displayed image is recropped, the thumbnail may still show the original full frame.
  • MakerNotes — manufacturer-specific extension blocks. Often opaque, sometimes contain the unedited preview, white balance bracket, or internal IDs.

The primary goal of any EXIF strip: remove GPS, serials, timestamps, and embedded thumbnails, in that priority order.

Method 1: macOS

Option A — Photos.app location reset (GPS only):

  1. Open the photo in Photos.
  2. Cmd+I (Get Info).
  3. Click the location → AdjustRevert to Original Location or No Location.

Strips GPS only. Camera, lens, timestamps, serial — all stay. Useful if you only care about geotagging.

Option B — Preview "Export As" (most EXIF):

  1. Open in Preview.
  2. File → Export.
  3. Pick JPG or PNG, leave the alpha and quality settings, click Save.

Preview's export drops most EXIF (GPS, camera, software, edit history) but keeps the color profile. It is a quick path for casual stripping.

Option C — Compresto (one-click batch, complete):

Compresto is a native Mac app with a Strip EXIF toggle on every export. Drop one photo or a thousand. The strip is implemented via a complete metadata wipe with optional ICC profile retention.

Drag photos → toggle "Strip metadata" → Export.

Hardware-accelerated, no upload, batch-safe. Free tier handles unlimited batch sizes. Download Compresto.

Option D — ExifTool (CLI, total control):

brew install exiftool

# Strip ALL metadata
exiftool -all= photo.jpg

# Strip only EXIF (preserve XMP, IPTC)
exiftool -EXIF:all= photo.jpg

# Strip only GPS
exiftool -GPS:all= photo.jpg

# Strip in place (no .jpg_original backup)
exiftool -all= -overwrite_original photo.jpg

# Batch a folder
exiftool -all= -overwrite_original *.jpg

ExifTool is the canonical tool. Under the hood of every "EXIF remover" desktop app, online tool, and library is some wrapper around ExifTool or its native equivalent.

Option E — sips (built-in CLI):

macOS ships with a tool called sips for image processing. It can strip EXIF as a side effect of re-encoding:

sips -s format jpeg -s formatOptions 80 photo.jpg --out output.jpg

This re-encodes the JPEG and drops most EXIF. Less complete than ExifTool, but useful when you don't want to install anything.

Method 2: Windows

Option A — File Explorer (built-in, partial):

  1. Right-click the photo → Properties.
  2. Click the Details tab.
  3. Scroll to the bottom, click Remove Properties and Personal Information.
  4. Pick Create a copy with all possible properties removed and click OK.

This handles EXIF camera and GPS fields but leaves XMP edit history. It is the right tool for casual privacy needs.

Option B — ExifTool for Windows:

Download the Windows executable from exiftool.org, unzip, rename to exiftool.exe, place on PATH. Run from PowerShell:

exiftool -all= photo.jpg

Same syntax as Mac/Linux.

Option C — Free third-party apps:

  • EXIF Purge — single-purpose, batch-friendly, drag-and-drop.
  • IrfanView with EXIF plugin — the long-running freeware classic.
  • XnView MP — free for personal use, batch metadata operations.
  • PhotoME — older but still works for EXIF-only strips.

Method 3: iPhone (iOS 17+)

Strip GPS at share time (recommended path):

  1. Select the photo and tap Share.
  2. Tap Options at the top of the share sheet.
  3. Toggle Location off.
  4. Send via your destination of choice.

This is the simplest path for most users. The recipient gets a photo without GPS but with the rest of EXIF intact. Apps like Mail, Messages, AirDrop, Slack, and most third-party apps respect this setting.

Permanently remove GPS from a photo (not just on share):

  1. Open the photo in Photos.
  2. Tap the i info button.
  3. Tap Adjust next to the location.
  4. Tap No Location.

Strip all EXIF (third-party app needed):

iOS does not expose a "strip all EXIF" toggle. For a complete strip, install:

  • Metapho ($3.99) — view, edit, and remove all EXIF + XMP on a single photo or batch.
  • Exif Eraser (free) — single-purpose, batch-friendly.
  • Photo Investigator (freemium) — view and strip metadata.

Pro tip — disable EXIF GPS at capture time:

Settings → Privacy & Security → Location Services → Camera → set to Never. Photos taken after this change carry no GPS at all. Existing photos are unaffected; you still need to strip them retroactively.

Method 4: Android

Strip location via Google Photos:

  1. Open the photo in Google Photos.
  2. Tap Share.
  3. Tap Remove location at the top of the share sheet (only appears if location is present).
  4. Send.

This option's behavior varies across Android versions and OEM Photos apps. Samsung's Gallery has its own equivalent.

Strip all EXIF (third-party):

  • Photo Exif Editor (free) — view and remove.
  • Exif Eraser (free) — single-purpose.
  • ImagePipe (free, FOSS) — open-source batch metadata stripper.

For maximum control, install Termux + ExifTool:

pkg install exiftool
exiftool -all= /sdcard/Pictures/photo.jpg

Disable GPS at capture:

In the camera app settings, find Location tags or Geotag photos and toggle off. The exact path depends on OEM.

Method 5: Online tools (when no install possible)

For one-off strips:

  • EXIF Remover (exifremover.com) — drag, click, download. Browser-only.
  • Verexif (verexif.com) — view first, then strip.
  • Pics.io Metadata Remover — clean UI.
  • Metadata2Go — handles images, videos, PDFs.

Privacy warning: if the tool uploads your photo to a server during processing, your image and its metadata sit on their disks for some retention window. Compresto's EXIF Data Remover and Image Metadata Extractor both process locally in your browser via WebAssembly — files never leave your device.

Method 6: The CLI one-liner you should bookmark

For terminal users, save this:

exiftool -all= -overwrite_original "$@"

Wrap it in a shell function:

strip_exif() {
  exiftool -all= -overwrite_original "$@"
}

Or as a Mac Automator quick action — right-click any photo in Finder → Strip EXIF → done.

For folder-level batch:

exiftool -all= -overwrite_original -ext jpg -ext jpeg -ext png -ext heic /path/to/folder

Verifying the EXIF strip worked

Trust nothing. Always verify.

Quick check via ExifTool:

exiftool stripped.jpg | wc -l

A clean JPG returns ~6–10 lines (file size, dimensions, MIME type, JFIF header). 50+ lines means EXIF is still present.

Granular check for specific fields:

exiftool -GPS:all stripped.jpg
exiftool -SerialNumber stripped.jpg
exiftool -DateTimeOriginal stripped.jpg

Each should return empty output if stripped correctly.

Visual check via web:

Drop into the Compresto Image Metadata Extractor or any EXIF viewer. A successful strip shows a near-empty metadata panel.

Common failure modes:

  • The tool stripped EXIF but left XMP edit history (shows software, edit dates).
  • The tool stripped main EXIF block but left MakerNotes (camera-specific extensions).
  • The embedded thumbnail JPEG was not stripped, and it has its own EXIF.
  • The strip created a .jpg_original backup that you forgot to delete — leaking the same data from a different filename.

For ExifTool, check .jpg_original files:

find /path/to/folder -name "*_original" -delete

What about JPEG XL, HEIC, and RAW?

EXIF lives in a standard chunk that travels with the image, but each container handles it slightly differently.

  • JPEG / JFIF — EXIF in APP1 marker. ExifTool handles cleanly.
  • HEIC / HEIF — EXIF in mdat box plus a separate metadata item. Newer iPhone format. ExifTool 12+ handles correctly.
  • RAW (CR2/CR3/NEF/ARW/RAF/DNG) — EXIF + maker notes + sometimes a JPEG preview with its own EXIF. Strip with caution: some RAW processors rely on white-balance and lens-correction tags. If you are stripping for archive, fine. If you are passing the file to a printer or RAW developer, keep the technical EXIF and strip only GPS:
exiftool -GPS:all= -OwnerName= -SerialNumber= raw.cr3
  • JPEG XL — supports EXIF natively. ExifTool 13+ handles. Less common than the above formats.
  • WebP — EXIF chunk supported but rarely written by capture devices. Strip with the same -all= syntax. See our compress WebP guide for context.

EXIF and social media platforms

What major platforms strip on upload (verified 2026):

PlatformEXIFGPSXMPEmbedded thumbnail
InstagramYesYesYesYes
Twitter/XYesYesYesYes
FacebookYesYesSomeYes
WhatsAppYesYesYesYes
DiscordNoNoNoNo
SlackNoNoNoNo
TelegramNoNoNoNo
iMessageNoNoNoNo
SignalYes (default)YesYesYes
EmailNoNoNoNo
Reddit (i.redd.it)YesYesYesYes
Reddit (imgur, flickr embed)NoNoNoNo

Rule: assume nothing is stripped unless you tested it. If your photo is going somewhere it might be re-shared, scraped, or archived, strip it yourself before sending.

Combining EXIF removal with compression

The optimal "publish-ready" pipeline for any photo:

  1. Resize to display dimensions (1920px wide max for web, 800px for thumbnails).
  2. Strip EXIF with one of the tools above.
  3. Compress to MozJPEG quality 80 — see compress JPG and compress images for web.
  4. Verify the strip and the file size before publishing.

In Compresto, the Web preset combines all four steps into one drag. That's typically a 4 MB phone photo → 200 KB clean JPG with no GPS, no serial, no edit history.

For PDFs, the same logic applies — see remove metadata from PDF. For viewing what is in EXIF before stripping, use the EXIF viewer tools.

FAQ

Does removing EXIF data reduce image quality? No. EXIF is a separate metadata block; the pixel data is untouched. The file shrinks by ~5–50 KB depending on how much EXIF was present.

Can I recover EXIF after stripping? Generally no. Once you save over the file, the metadata is gone. ExifTool creates a .jpg_original backup by default — if you have not deleted it, the original is recoverable from that file.

Why do my edited photos still have EXIF? Most editors (Lightroom, Photoshop, Capture One) preserve EXIF by default and add their own XMP edit history on top. To strip, export with metadata disabled (Lightroom: Export → Metadata → Include: "Copyright Only" or "None") or run through ExifTool after.

Does removing EXIF stop reverse image search? No. Reverse search hashes pixels, not metadata. To break reverse search you have to alter the image (crop, recolor, watermark).

What's the difference between "strip EXIF" and "strip all metadata"? EXIF is one metadata block among several. Photos can also carry IPTC (editorial), XMP (Adobe edits), embedded thumbnails, and MakerNotes (camera-specific). exiftool -EXIF:all= strips only EXIF. exiftool -all= strips everything.

Can someone undo my EXIF strip with forensic tools? For practical purposes, no. Once the file is saved without EXIF, the metadata is gone from that file. Forensic recovery would need access to the source file, the camera, or a cloud backup that retained the original.

What about iPhone Live Photos? Live Photos are a JPEG + a paired MOV. The MOV carries its own EXIF and timestamp. If you share the still as a JPEG only, the MOV's metadata stays on your device. If you share the Live Photo bundle, both files carry metadata — strip both or convert to a flat JPEG first.

TL;DR

  • iPhone: Photos share sheet → Options → Location off, OR Metapho for full strip.
  • Android: Google Photos share → Remove location, OR install Photo Exif Editor.
  • Mac: Compresto for one-click batch, OR exiftool -all=.
  • Windows: File Explorer → Properties → Details → Remove Properties, OR ExifTool.
  • Online: prefer browser-only tools like the Compresto Image Metadata Extractor.
  • Verify with exiftool or an EXIF viewer. Trust nothing.
  • Combine with JPG compression for the smallest, cleanest, safest output.
  • For PDFs: see remove metadata from PDF. For broader strategy: remove metadata from photo.

EXIF leaks are silent, automatic, and forever-present in old photos you've already shared. The fix takes 30 seconds. Make it a habit.

Ready to compress your files? Join thousands of creators using Compresto ⚡