Metadata Viewer
& Privacy Auditor.

Drop a photo below to see the hidden metadata structures. This audit is performed entirely on your device - your image never leaves your browser.

Click or Drag Photo

Select a JPEG, PNG, or HEIC file to audit.

The Forensic Reality of Your Photos.

Every time you snap a photo, your device does more than just capture light. It generates a hidden technical dossier known as Metadata. This data, embedded in the headers of your image files, is a forensic goldmine for data scrapers, social media platforms, and malicious actors.

Understanding the Three Pillars of Image Data

  • EXIF (Exchangeable Image File Format): Captures hardware-level signatures. This includes entities like Exif.Image.Make, Exif.Photo.LensModel, and most dangerously, precise Exif.GPSInfo.GPSLatitude and Exif.GPSInfo.GPSLongitude coordinates.
  • XMP (Extensible Metadata Platform): A modern XML-based standard. It often contains XMP-dc:Description, unique XMP-xmpMM:InstanceID strings, and software versions that can link an anonymous photo back to your specific workstation.
  • IPTC (International Press Telecommunications Council): Used primarily by journalists, this often contains IPTC:Keywords, IPTC:By-line (Creator), and copyright statuses that you might not intend to share with the public.

Why a Local Audit is the Only Secure Audit

Most "Online Metadata Viewers" work by uploading your photo to their servers. This is a privacy paradox—to check if your data is safe, you have to give it to a third party. Strip Photo solves this by performing the entire forensic scan within your browser's sandboxed environment.

Your image never touches our infrastructure. The audit you see above is generated by your own CPU, ensuring that your private location data remains exactly where it belongs: on your device.