Digital Forensics

EXIF Data: 6 Things Your Photos Tell Strangers

Every digital photo contains hidden EXIF metadata including GPS location, camera settings, and timestamps. Learn what this data reveals and how to control it.

MC
MetaClean Team
January 23, 2026
13 min read

What EXIF Data Actually Is

Every time you press the shutter on a smartphone or digital camera, two things happen simultaneously. The sensor captures the image you intended to take. And the device quietly writes a second, invisible block of structured data embedded inside that same file — describing exactly how, when, and where that image was created.

That hidden block is EXIF data. EXIF stands for Exchangeable Image File Format, a standard developed in 1995 by the Japan Electronic Industries Development Association. The original goal was practical: let cameras communicate technical settings to printers and editing software. But decades of GPS chips, always-on connectivity, and sophisticated mobile operating systems have turned EXIF into something far more revealing than its creators intended.

A photo taken with an iPhone 15 can contain up to 47 distinct metadata fields. Most people share this data without knowing it exists.

⚠️

Privacy Alert

EXIF data includes your precise GPS coordinates, device model, the exact second the photo was taken, and every application that has ever processed the file. This information is invisible in most photo viewers but accessible to anyone with free tools like ExifTool or Jeffrey's Exif Viewer — no technical skill required.

Where EXIF Data Comes From

The data isn't assembled from one place — it's collected from multiple hardware and software components inside your device, each contributing its own layer of information.

The Camera Sensor and Optics

When light hits the image sensor, the camera's processor records the technical conditions of the exposure. Aperture (f-stop) records how wide the lens opening was. Shutter speed captures how long the sensor was exposed to light. ISO sensitivity shows how much the sensor amplified the signal. Focal length captures the zoom level. Metering mode records how the camera calculated the correct exposure.

These fields are written by the camera firmware automatically. They're useful to photographers reviewing their work, but they also reveal which specific lens was used — relevant in investigative contexts, and sometimes traceable to a specific serial number in the MakerNotes section.

The GPS Chip

This is where EXIF becomes genuinely dangerous for most users. Modern smartphones contain dedicated GPS chips that triangulate position using GPS satellites, Wi-Fi network positioning, and cellular tower data. When Location Services is enabled for the camera app — which is the default on both iOS and Android — this position is written into the EXIF block every time a photo is taken.

The GPS fields aren't a vague area. They include latitude and longitude to six decimal places, accurate to roughly 10 centimeters in ideal conditions. They also include altitude above sea level, the direction the camera was pointing (GPS bearing), speed of movement if taken from a vehicle, and a GPS timestamp independent of the camera's system clock.

92%
of photos shared on social media before platform processing still contained GPS data, according to 2023 research into pre-upload file metadata — meaning users shared their location without knowing it

The System Clock and Software Layer

Beyond GPS, the operating system writes several timestamp fields. The original capture date and time is stored in the camera's local timezone. A modified timestamp updates every time the file is processed by editing software.

The software field is particularly informative. Every application that touches the file — from the camera app to editing tools to file converters — can leave its name and version in the EXIF block. A chain like "Camera/1.0 → Lightroom 7.0 → Photoshop 2024" traces the entire production history of an image and can reveal the software subscriptions a creator holds.

The Complete EXIF Field Catalog

In our testing with ExifTool on images captured by current smartphones and dedicated cameras, we consistently found the following categories of data present in unmodified files.

Device Identification Fields

Make (manufacturer name, e.g., "Apple"), Model (device model, e.g., "iPhone 15 Pro"), and Software (OS version at time of capture). These three fields alone allow anyone to determine the exact device used. Combined with other metadata, they can link multiple photos to a single physical device — a technique used in both investigative journalism and law enforcement.

Exposure and Optical Fields

Aperture value, maximum aperture, shutter speed value, exposure time, ISO speed ratings, exposure program, exposure bias, metering mode, light source, flash status (fired, return light detected, auto mode), focal length, and 35mm equivalent focal length. On dedicated cameras, lens make, model, and serial number also appear here or in MakerNotes.

GPS Fields

GPSLatitude, GPSLatitudeRef (North or South), GPSLongitude, GPSLongitudeRef (East or West), GPSAltitude, GPSAltitudeRef, GPSTimeStamp (UTC time from GPS satellite), GPSDateStamp, GPSSpeed, GPSSpeedRef, GPSTrack (direction of movement), GPSImgDirection (direction the camera was pointing), and in some devices GPSMeasureMode and GPSDOP (dilution of precision, indicating positional accuracy).

Security Risk

The GPSImgDirection field records which direction the camera was facing when the photo was taken. Combined with GPS coordinates, a photo taken inside your home can reveal not just your address but the approximate layout of your rooms — information that is directly useful to burglars and dangerous in a stalking context.

MakerNotes — The Hidden Layer

Standard EXIF viewers only show the official fields. But manufacturers embed a private section called MakerNotes containing proprietary data not visible in ordinary tools. Apple's MakerNotes include scene type, image stabilization data, face detection results (the number of faces detected at capture is recorded), HDR processing flags, and internal identifiers. Canon and Nikon MakerNotes include camera serial numbers — unique identifiers that link multiple photos to a single physical device across years.

Based on our analysis of hundreds of files from different device types, most free EXIF viewers don't display MakerNotes at all. But the data remains in the file and is accessible to anyone using professional tools. Our tool removes it completely alongside all standard fields.

Real-World Privacy Risks

The privacy implications of EXIF data aren't theoretical. They've caused documented harm across multiple contexts, and understanding the specific mechanisms helps you assess your own exposure.

Stalking and Physical Safety

The most direct risk is location exposure. A photo taken at home — of a new purchase, a pet, a child's birthday party — contains coordinates that map to your front door. Anyone who downloads that file and opens it in ExifTool has your address in under thirty seconds. In documented cases, stalkers have used geotagged photos from public social media profiles to physically locate victims. Our article on the dangers of geotagging covers specific case patterns and mechanisms in depth.

Burglary Risk

Research has consistently linked social media photo sharing to residential burglary. When families post photos that contain GPS data tied to their home address, they're publishing both their location and — through timestamps — information about their daily patterns. A sequence of timestamped home photos shows when people are typically present and when they're away.

Journalist Source Protection

A source who photographs a sensitive document with their phone may inadvertently reveal their location or device fingerprint. If the same device has been associated with their identity elsewhere, the MakerNotes serial number creates a traceable link between the document and the source. Our article on OSINT and photo metadata explains exactly how investigators make these connections using publicly available tools.

GDPR and CCPA Implications for Businesses

Under the EU's General Data Protection Regulation, GPS coordinates embedded in a photo qualify as personal data — because they can identify a natural person's location. Any business that collects, stores, or processes user-uploaded images containing EXIF data is handling personal data and must comply with GDPR's requirements for consent, data minimization, and retention limits.

The California Consumer Privacy Act creates similar obligations for businesses operating in California. Users have the right to request deletion of personal data — which explicitly includes geolocation data embedded in their uploaded photos. Businesses that don't strip EXIF from user-uploaded images may be retaining geolocation data they're legally required to delete on request, without even knowing it. This is a compliance risk that's easy to overlook.

🔒

How It Works

  • GDPR Article 4 defines location data as personal data when it can identify a person
  • GDPR Article 5 requires data minimization — only collect what is necessary for the stated purpose
  • CCPA gives California residents the right to opt out of sale and to request deletion of personal data including location history
  • Businesses storing user photos with GPS EXIF data should document this in their records of processing activities under GDPR Article 30

How to View Your Photo's EXIF Data

Before removing EXIF data, it's worth seeing exactly what your photos contain. There are several ways to inspect this information, each showing a different depth of data.

Windows

Right-click any image file, select Properties, then click the Details tab. You'll see basic EXIF fields including camera make and model, exposure settings, and GPS coordinates if present. This view is convenient but incomplete — it doesn't show MakerNotes or all GPS sub-fields.

macOS

Open the image in Preview, then go to Tools and select Show Inspector. Click the EXIF tab for camera and exposure data. For GPS data, click the GPS tab if one appears. The built-in macOS view shows a subset of the full EXIF block — enough for casual inspection but not forensic analysis.

ExifTool

ExifTool, developed by Phil Harvey and actively maintained, is the most comprehensive EXIF reader available. Running exiftool -all filename.jpg in a terminal outputs every single metadata field including MakerNotes. This is the tool professional investigators and forensic analysts use. It's free, accurate, and available for Windows, macOS, and Linux.

MetaClean

Our image EXIF tool displays all metadata fields before you choose to remove them. Unlike Windows Properties or macOS Preview, it reads the complete EXIF block including GPS sub-fields and MakerNotes categories. Everything happens in your browser — the file is never sent to any server. This makes it safe to use even for sensitive files.

How to Remove EXIF Data

The right removal method depends on your operating system, technical comfort, and how thorough you need the removal to be. Results vary between methods, and that variation matters in sensitive contexts.

Windows Built-in Method

Right-click the image, select Properties, go to Details, and click "Remove Properties and Personal Information" at the bottom. You can choose to remove all possible properties or create a copy with specific fields cleared. This method is convenient but incomplete — it doesn't remove MakerNotes, and it only clears the fields that Windows' own display knows about.

MetaClean

Open metaclean.app/image-exif in any browser. Drop your photos in. The tool reads and displays all metadata, then removes the complete EXIF block — including MakerNotes — and provides a clean file for immediate download. No installation, no account, no upload to any server. Processing happens entirely on your device using WebAssembly. For most users sharing photos publicly or in sensitive contexts, this is the method we recommend. You can process multiple files simultaneously.

ExifTool (Advanced)

For users comfortable with the command line, exiftool -all= filename.jpg removes all metadata. The -all= flag sets every field to empty and writes a clean output. This is the most thorough desktop method available. We use ExifTool internally to verify our own tool's output.

💡

Quick Tip

After removing EXIF data with any tool, verify the result by dropping the cleaned file back into MetaClean or running ExifTool on it. Verification catches edge cases where certain MakerNote fields persist despite removal attempts — which does happen with some older or less thorough tools.

When to Keep EXIF Data

Removal isn't always the right answer. EXIF data has legitimate uses, and understanding them helps you make intentional decisions rather than blanket ones.

Photographers who sell stock images typically need to retain copyright and creator information embedded in IPTC fields. Photographers reviewing their own technique benefit from keeping exposure data to understand which settings produced which results. Families organizing digital archives benefit from timestamps and location data for sorting memories by place and time.

The key principle is intentionality. Keep EXIF when it serves your purpose and the sharing context is controlled. Remove it when you're sharing publicly, with strangers, or in contexts where location and device information creates risk you haven't consented to.

Key Takeaway

EXIF data is comprehensive, automatic, and largely invisible to most users. It records not just how a photo was taken but where you were standing, what device you used, and the precise second it happened. For anyone sharing photos online, with strangers, or in professional contexts, understanding and controlling EXIF data is a fundamental privacy practice — not an edge case.

Frequently Asked Questions

Does removing EXIF data change image quality?

No. EXIF data is stored in the file's header, separate from the pixel data. Removing it doesn't alter the image's appearance, resolution, or color fidelity. The file size decreases slightly — typically by 50 to 200 kilobytes depending on how much metadata was present — but the visual content is completely unchanged.

Can EXIF data be re-added after removal?

Yes. If you open a cleaned image in editing software and re-save it, that software typically writes a new minimal EXIF block containing at least the software name and modification date. GPS data won't return because the software has no GPS information to write — but software and timestamp fields will reappear from the editing application. If you need to share a clean file, do the removal as the last step before sharing.

Do all image formats carry EXIF data?

JPEG and TIFF support EXIF natively and are the most common carriers. HEIC (iPhone's native format) supports EXIF fully. PNG supports metadata through a different mechanism and GPS data is less commonly embedded. WebP supports XMP metadata. Raw camera formats carry extensive EXIF and MakerNotes. When converting between formats, EXIF may or may not be preserved depending on the conversion tool — always verify after conversion if privacy is a concern.

Free Online Tool
Remove Metadata Now

Strip EXIF data, GPS location & hidden metadata from your photos and PDFs — instantly. Files never leave your device.

Related Articles