Does WhatsApp Send Your Video's GPS Location? We Tested It
We recorded a clip at home, sent it two ways in WhatsApp, and extracted the metadata on the other end. Here's exactly what GPS data your recipients can see.
Short Answer
It depends on how you send the video. Send as standard video (compressed) and WhatsApp re-encodes the file, usually stripping the GPS location atom in the process. Send as Document — which many people do specifically to keep quality — and WhatsApp delivers the original file untouched, GPS coordinates and all. We recorded a test clip at a fixed location, sent it both ways, and extracted the metadata on the receiving end. The Document mode result was unambiguous: exact coordinates, readable by anyone with a free tool.
We Recorded a Clip at Home and Sent It
Here's how the test worked. We recorded a short video on an iPhone 15 Pro and a Samsung Galaxy S24, both with location services on for the camera. Before sending anything, we verified the embedded coordinates using MediaInfo and ExifTool — both devices had written precise GPS data directly into the video container. The iPhone embedded its location as a com.apple.quicktime.location.ISO6709 atom; the Android wrote a ©xyz atom. Different formats, same result: exact latitude, longitude, and altitude sitting in the file.
We then sent each clip two ways inside the same WhatsApp conversation: once as a normal video (the default — WhatsApp compresses and embeds it inline in the chat), and once using "Document" mode to preserve quality. On the receiving end, we immediately ran the same ExifTool analysis.
The compressed video: GPS gone. WhatsApp had re-encoded the clip, and the re-encoding stripped the location atom — the same side-effect mechanism that strips GPS from compressed photos.
The Document send: every field intact. Coordinates, altitude, device model, recording timestamp, encoder version. We plugged the coordinates into Google Maps. They pointed directly at the recording location.
Why Compressed Sends Strip GPS but Documents Don't
The technical explanation is worth understanding because it shows why this isn't a deliberate privacy feature — it's a side effect of file handling architecture.
When WhatsApp sends a video inline (the default mode), it re-encodes the clip. Resolution is capped at roughly 720p, bitrate drops to around 1.2–1.6 Mbps, and audio gets re-encoded to AAC at a lower bitrate. That re-encoding step creates a brand-new container — which WhatsApp populates with minimal metadata. The GPS atom doesn't carry over into the new container. Location data disappears not because WhatsApp is intentionally protecting you, but because it's building a new file from scratch.
Document mode is fundamentally different. WhatsApp treats the file as an opaque blob — it doesn't touch it, doesn't re-encode it, doesn't inspect what's inside. The file you sent is the file the recipient downloads. Every byte of the original is preserved, including all the metadata atoms in the container. That's why quality is also preserved. And that's why GPS survives.
This same logic applies to photos — our earlier tests on how WhatsApp handles photo metadata found the same pattern. Document mode for photos also preserves 100% of EXIF, including GPS. Videos are no different, and in some ways the risk is larger because smartphone video containers can carry more metadata fields than a JPEG.
Privacy Alert
Sending a video as a Document in WhatsApp transmits the original file with zero modification. If the video contains GPS coordinates — which any clip recorded on a location-enabled smartphone does — the recipient gets exact coordinates. WhatsApp provides no warning before you send, and the recipient sees a normal file attachment.
What Metadata Actually Survives in Document Mode
GPS coordinates get the most attention, but they're not the only data that travels with a video sent as a Document. In our Document-mode test transfers, we consistently found:
- GPS coordinates — latitude, longitude, and altitude encoded in the container
- Device make and model — "Apple iPhone 15 Pro" or "samsung SM-S928B" verbatim
- Recording timestamp — the exact date and time the clip was captured
- Recording software — identifies whether the clip was from the native camera app, a third-party app, or a screen recording
- Encoder version — the specific codec and version string
- Duration, resolution, frame rate — technical properties that identify the device class
The combination matters. GPS plus timestamp plus device model is enough to place a specific person at a specific location at a specific time — all from a single clip. For a deeper look at everything video files carry, our video metadata privacy complete guide breaks down every container field by device type.
Security Risk
GPS plus device model plus timestamp in a single Document-mode video sends the recipient enough data to verify who recorded it, where, and when — even if the video content itself reveals nothing. This is the data combination that forensic investigators extract from WhatsApp evidence.
Group Chats Make This Worse
Individual chats are one thing. Group chats are a different risk profile entirely.
When you share a video as a Document in a group chat, every member of the group receives the original file with metadata intact. A work group with 30 people, a family group with cousins you barely know, a neighborhood group with strangers — every single person who downloads that file gets your GPS coordinates.
You might trust the person you intended to share with. But WhatsApp groups often include people you know less well, and the file can be forwarded from the group to other contacts. Once a Document-mode video leaves your device, you have no control over who views its metadata.
Group video sharing is also where the scale of exposure is hardest to anticipate. A video of a birthday party at your home sent as a Document to the family group? Every family member now has your home address in metadata form — even if you've never shared it directly.
What the Recipient Sees (and Can Extract)
You might wonder whether recipients actually know to look. The answer: most won't check. But some will — and anyone who wants to extract the metadata can do it in under two minutes with freely available tools.
MediaInfo is a free desktop application available for Windows, macOS, and Linux. Open a video file in MediaInfo and the GPS coordinates appear under "General" or "Extra" fields — no command-line required. ExifTool gives even more detail in a few seconds. Online tools at sites like metadata2go.com let anyone extract video metadata without installing anything.
The sophistication barrier here is essentially zero. This isn't a forensic-lab operation. It's a right-click and a free download. Forensic analysts have confirmed extracting GPS data from WhatsApp video evidence using exactly these tools — the same ones available to anyone.
Quick Tip
If you want to check what's in a video before sending it, drop it into MetaClean's video metadata viewer to see every field it contains. It runs entirely in your browser — nothing is uploaded to any server.
Compressed vs. Document Mode: The Full Picture
Here's a clear breakdown of what each WhatsApp video send mode actually does:
Standard video send (inline/compressed): WhatsApp re-encodes the clip at lower resolution and bitrate. GPS and most device metadata are stripped as a side effect of re-encoding. The recipient gets a lower-quality clip with minimal metadata. File size is capped at 16 MB for inline sends. This is the safer mode for privacy — not because WhatsApp is protecting you, but because compression destroys the data as a byproduct.
Document mode: WhatsApp delivers the original file unchanged. All metadata survives. The recipient can download up to 2 GB. Quality is fully preserved. This is the higher-risk mode — and it's the mode many people specifically choose when they want quality, not realising the metadata trade-off they're making.
It's worth noting that the "compressed" result isn't 100% reliable as a privacy guarantee. We observed rare cases where some metadata fields survived compression in edge cases — older app versions, specific Android builds, high-bitrate clips that triggered different re-encoding paths. For complete certainty, you can't rely on WhatsApp's compression to protect you. You need to clean the file before it leaves your device.
End-to-End Encryption Doesn't Help Here
A lot of WhatsApp users assume that end-to-end encryption solves privacy comprehensively. It doesn't — and this is one of the clearest illustrations of why.
WhatsApp's E2E encryption is real. It prevents third parties from intercepting and reading message content in transit. WhatsApp itself can't read your messages. But encryption works on the content of files as they travel between devices. It doesn't modify what's inside those files before they're encrypted.
If your video file contains GPS coordinates when it leaves your device, those coordinates are encrypted along with the rest of the file. When the recipient decrypts the message, they receive the original file — GPS coordinates included. The encryption protected the file from interception. It didn't remove any data. The recipient still gets everything.
This is the same gap we document in our article on how Telegram handles metadata: encryption and metadata removal are entirely separate operations, and E2E encryption alone doesn't give you either.
How to Clean Video Metadata Before Sending
The reliable approach is to strip metadata from the video before you send it — making the mode you use irrelevant, because there's nothing left to expose.
On desktop, ExifTool can remove all metadata from an MP4 in one command: exiftool -all= yourfile.mp4. It's free, open-source, and works on Windows, macOS, and Linux. HandBrake is another option — re-encoding through HandBrake with default settings produces a clean output file with minimal metadata.
If you want a browser-based option that doesn't require installing anything, MetaClean's video metadata tool strips GPS, device model, timestamps, and other container fields directly in your browser. No upload to any server — processing happens locally on your device. Drop in the clip, download the clean version, then send via WhatsApp however you like. Compressed or Document mode — it doesn't matter when the metadata is already gone.
For anyone who regularly shares video clips — real estate walkthroughs, product demos, event recordings — building a metadata-strip step into the workflow before sending is the practical solution. Our tool supports batch processing, so you can clean several clips at once before a sending session.
Key Takeaway
WhatsApp compressed video sends strip GPS as a side effect of re-encoding — but this isn't a guaranteed privacy protection. Document mode preserves 100% of the original file including GPS coordinates, device model, and timestamp. End-to-end encryption provides no protection against recipients reading your metadata. Group chats multiply the exposure. The only approach that gives you certainty is removing video metadata before sending — making WhatsApp's pipeline behavior irrelevant.
Frequently Asked Questions
Does WhatsApp remove GPS from videos automatically?
Only partially — and only in one mode. When you send a video through WhatsApp's standard compressed mode, the re-encoding process usually strips GPS as a side effect. But when you send as Document (to preserve quality), WhatsApp transmits the original file unchanged, and GPS coordinates survive intact. There's no setting to force automatic GPS stripping across all send modes.
What if I just send the video normally — is that safe?
Standard compressed sends strip GPS in most cases, but it's not a guarantee. We found edge cases where metadata survived compression — particularly with specific app versions and high-bitrate source clips. If the video was recorded at a sensitive location (your home, office, a private gathering), stripping metadata before sending is the only approach that gives you certainty regardless of send mode.
Does sending video in a WhatsApp group expose GPS to everyone?
Yes — when sent as Document, every member of the group receives the original file with all metadata intact. That includes GPS coordinates, device model, and recording timestamp. Each member can download and inspect the file independently. You have no control over what they do with that data or whether they forward the file further.
Can WhatsApp's end-to-end encryption protect my GPS location in videos?
No. End-to-end encryption protects the file from interception during transmission — it prevents third parties from reading message content. But it doesn't modify what's inside the file. If your video contains GPS coordinates, those coordinates are encrypted and then decrypted on the recipient's device, arriving exactly as they were in the original. The recipient can read them with any free metadata tool.
How do I check if my video has GPS data before sending?
Drop the clip into a free tool like MediaInfo (desktop) or an online viewer like metadata2go.com before sending. If a GPS field appears, the location is embedded. You can also use MetaClean's video metadata viewer directly in your browser — it shows every field in the file without uploading anything. Once you've confirmed what's there, you can strip it before sharing.
Does this apply to WhatsApp Business too?
Yes — WhatsApp Business uses the same file-handling infrastructure as the consumer app. Document mode sends in WhatsApp Business preserve all video metadata including GPS. If you send product photos, property walkthroughs, or any sensitive video through WhatsApp Business as a Document, the same metadata exposure applies. Under GDPR, if your business processes personal location data embedded in files, that creates compliance considerations beyond individual privacy risk.
Strip EXIF data, GPS location & hidden metadata from your photos and PDFs — instantly. Files never leave your device.
Related Articles
WhatsApp 'Send as Document' Sends Your Home GPS — No Warning
Sending photos via WhatsApp, Telegram, or Signal? Find out which apps keep your GPS location intact and which ones clean it.
How to Remove Metadata from Videos [Complete 2026 Guide]
Your videos contain more than just footage - hidden metadata reveals your location, device, and editing history. Learn how to remove it before sharing.
Telegram's 'Send as File' Leaks Your GPS — Every Single Time
Telegram strips EXIF from compressed photo sends — but preserves all metadata when you send as a File. Here's exactly what happens and why it matters.