What Is EXIF Data? A Plain-Language Guide
EXIF data is the hidden information your camera embeds in every photo — GPS, timestamps, device info. Here's what it is and why it matters.
The short version
Every photo you take with a smartphone or digital camera contains hidden data called EXIF. This data records where the photo was taken, when, with what device, and dozens of technical settings. You cannot see EXIF data by looking at the photo. But anyone who receives the image file can extract it in seconds.
What EXIF stands for
EXIF stands for Exchangeable Image File Format. It is a standard created by the Japan Electronic Industries Development Association (JEIDA) in 1995 and adopted globally by camera and smartphone manufacturers. The current version, EXIF 2.32, was published in 2019.
EXIF is not a file format itself — it is a specification for how metadata should be embedded within image files. It applies to JPEG, TIFF, and some RAW formats. HEIC files (used by modern iPhones) use a similar but distinct metadata container.
What EXIF data contains
GPS coordinates
The most privacy-sensitive EXIF field. When a smartphone takes a photo, it records the precise latitude and longitude — typically accurate to within 3-5 meters. This means a photo taken in your living room can pinpoint your home address. A photo taken at a client's office reveals that location. A photo taken at a hospital reveals which hospital.
GPS data is stored in the GPSLatitude, GPSLongitude, GPSAltitude, and GPSTimeStamp tags. Some cameras also record GPSSpeed and GPSDirection.
Date and time
EXIF records three timestamp fields:
- DateTimeOriginal — when the photo was taken
- DateTimeDigitized — when the image was digitized (usually identical to the original)
- DateTime — when the file was last modified
These timestamps include the date, time, and sometimes the timezone offset. They reveal exactly when a photo was captured, which can be significant in legal, journalistic, or personal contexts.
Camera and device information
- Make — the manufacturer (Apple, Samsung, Canon, Nikon)
- Model — the specific device (iPhone 15 Pro, Galaxy S24 Ultra, EOS R5)
- Software — the firmware version or editing software used
- LensModel — the specific lens (for interchangeable-lens cameras)
Unique identifiers
Some cameras embed serial numbers or unique device identifiers in EXIF data. The BodySerialNumber and LensSerialNumber tags can uniquely identify the specific camera that took a photo. This is how investigators have linked photos to specific devices in forensic cases.
Technical settings
EXIF records dozens of photographic parameters: exposure time, aperture (f-number), ISO speed, focal length, flash status, white balance, metering mode, and more. While these are primarily useful to photographers, they also reveal the conditions under which a photo was taken — indoor vs. outdoor, bright vs. dark, handheld vs. tripod.
Thumbnail
Many EXIF headers include a thumbnail — a small preview image embedded in the metadata. In rare cases, the thumbnail may show a version of the image from before it was cropped, potentially revealing content that the user intended to remove.
Where EXIF comes from
EXIF data is written by the camera's firmware at the moment the photo is captured. The camera reads its internal clock for timestamps, queries its GPS sensor for location, and records its own make, model, and settings. This happens automatically — there is no prompt or notification.
On smartphones, GPS embedding is controlled by location permissions for the camera app. On both iOS and Android, it is enabled by default when location services are active. Most users never change this setting.
How to view EXIF data
Windows
Right-click an image file, select Properties, then click the Details tab. This shows common EXIF fields including GPS coordinates (displayed as degrees, minutes, seconds), camera information, and timestamps.
macOS
Open the image in Preview, then select Tools > Show Inspector (or press Command+I). Click the EXIF tab to see metadata fields. For GPS data, the "GPS" section shows coordinates and altitude.
Command-line tools
exiftool is the most comprehensive EXIF reader. Running exiftool photo.jpg displays every metadata field in the file. It is available on Windows, macOS, and Linux.
Online tools
Several websites allow you to upload a photo and view its EXIF data. Be aware that uploading a photo to a third-party website shares the photo and its metadata with that service.
Which platforms strip EXIF data
Not all platforms preserve EXIF when you share a photo.
Platforms that strip EXIF data:
- WhatsApp — strips all EXIF from shared images
- Signal — strips all EXIF
- Facebook — strips EXIF from uploaded photos (but may retain it internally)
- Instagram — strips EXIF from uploaded photos
- Twitter/X — strips EXIF from uploaded images
Platforms that preserve EXIF data:
- Email attachments — EXIF is fully preserved
- Google Drive / Dropbox / OneDrive — EXIF is preserved in stored files
- Slack — EXIF is preserved in uploaded files
- SMS/MMS — behavior varies by carrier and device
- Direct file transfer (AirDrop, USB, etc.) — EXIF is fully preserved
The critical distinction: social media platforms generally strip EXIF, but professional file-sharing tools generally preserve it. The contexts where you share files professionally — email, cloud storage, Slack — are exactly the contexts where EXIF survives.
Why you should care
Location privacy
A real estate agent sharing property photos via email is also sharing the GPS coordinates of each property — not just the listing address, but the precise spot where they stood when taking each photo. A healthcare worker sharing clinical photos is sharing the GPS coordinates of the medical facility.
Device tracking
EXIF camera serial numbers can link multiple photos to the same device. If you share photos from your personal phone in a professional context, the serial number creates a link between your personal and professional photography.
Timestamp implications
Photos embedded in reports or proposals carry timestamps that reveal when the work was actually performed, which may differ from reported timelines.
The thumbnail issue
In 2003, a television presenter posted a cropped headshot online. The EXIF thumbnail still contained the uncropped original, which included content the presenter had intended to remove. This edge case is rare but illustrates how EXIF can preserve data you thought you deleted.
How to remove EXIF data
The most reliable approach is to use a tool that reads the image at the binary level, identifies all EXIF tags, removes them, and then verifies the removal by re-reading the output file. Simply re-saving an image in most photo editors does not guarantee that all EXIF fields are removed — some editors preserve certain fields and some add their own.
Purgit scans images for EXIF data including GPS coordinates, device identifiers, and timestamps. It removes all metadata at the structural level and verifies removal. No technical knowledge required.
[Scan a File Free]