EXIF Viewer & Stripper
Drop any JPEG. See every piece of metadata embedded inside — camera, lens, GPS, timestamps. Then strip it cleanly with no recompression and re-download.
Drop a JPEG, or click to select
Photos straight from a phone or DSLR work best — they carry the most metadata
EXIF parsing and stripping run locally via JPEG segment walking — no upload, no recompression of image data.
FAQ
What is EXIF data?▼
EXIF (Exchangeable Image File Format) is a block of metadata embedded inside JPEG and TIFF files. It records what camera and lens took the photo, settings (ISO, aperture, shutter speed), the date/time, and — if location was enabled — the exact GPS coordinates. It's invisible in the image but anyone can read it.
Why might I want to strip it?▼
Three reasons. (1) Privacy: GPS coordinates and timestamps are routinely embedded; uploading a photo can leak your home address. (2) Filesize: EXIF blocks add tens of KB. (3) Anonymity: camera/serial-number tags can identify you across uploads.
Does stripping recompress my photo?▼
No. We walk the JPEG segments and remove only the EXIF (App1) block — every other byte (image data, JFIF, ICC profile) is preserved exactly. The output is pixel-identical to the input, just without metadata.
Does this support PNG?▼
PNG metadata works differently (text chunks, XMP) and most cameras don't write it. The viewer handles JPEG only — that covers nearly every case where EXIF privacy matters.
Is the photo uploaded?▼
No. Reading and stripping happen in your browser via plain ArrayBuffer parsing. Verifiable in DevTools → Network during use.
Can I see the GPS coordinates on a map?▼
If GPS data is present, the tool shows the coordinates as latitude/longitude with a Google Maps link. The coordinates themselves are still being parsed locally — opening the map link is your choice.
Powered by Pyrelo
The all-in-one work dashboard for small teams
Tasks, finance, calendar, timesheet, notes, team chat, file storage, AI assistant, and these tools — all in one place.
See Pyrelo Dashboard