EXIF Viewer
Read EXIF metadata (camera, GPS, timestamps) from JPEG and HEIC images — locally.
How to Use
- Drop a JPEG, HEIC, TIFF, or RAW image into the input area.
- EXIF metadata is parsed and displayed: camera make/model, lens, exposure settings, timestamps, and GPS if present.
- GPS coordinates include an OpenStreetMap link to see exactly where the photo was taken.
- Use this to investigate suspicious images, verify the capture device, or audit what your photos reveal about you.
- To remove metadata before sharing, use our companion Strip Metadata tool.
- Everything happens locally — your photos are never uploaded.
Notes
Frequently Asked Questions
What is EXIF?
Exchangeable Image File Format — a metadata standard embedded in JPEG, TIFF, HEIC, and most RAW formats. Cameras and phones automatically write EXIF when you take a photo: timestamp, GPS coordinates (if location is enabled), camera make/model, lens model, ISO, aperture, shutter speed, focal length, white balance, and dozens more fields. The standard dates to 1995 and is maintained by JEITA (Japan Electronics and Information Technology Industries Association).
What metadata does my phone embed?
Modern smartphones write extensive EXIF: <strong>GPS coordinates</strong> (with altitude and direction), <strong>timestamp</strong> (with timezone), camera info, often the unique <strong>device model</strong>, and sometimes a thumbnail. iOS adds Apple-specific tags; Android adds OEM-specific tags. The result is that an unaltered phone photo can identify you, where you were, when, and what device you used — sometimes more precisely than people realize.
Should I strip EXIF before posting online?
For privacy, generally yes. Many platforms (Facebook, Instagram, X, Discord) automatically strip most EXIF on upload, but not all. Direct file uploads (forums, file sharing, direct messages) often preserve EXIF intact. Strip metadata before posting if location, timestamp, or device info would be sensitive.
What's the difference between EXIF and IPTC / XMP?
EXIF: technical data the camera wrote at capture time. IPTC: editorial metadata (caption, copyright, keywords, photographer name) typically added during editing. XMP (Extensible Metadata Platform): Adobe's modern superset that contains EXIF, IPTC, and arbitrary other tags in one XML structure. Most professional photo workflows use XMP sidecars; this viewer focuses on EXIF since it's the most universal.
Can EXIF be tampered with?
Easily — EXIF is just bytes in the file, modifiable with any EXIF editor. For forensic verification of authenticity, EXIF alone isn't sufficient. Use the Image Verifier & Forensics tool for content-based authenticity checks (Error Level Analysis, AI detection, C2PA signatures) that don't depend solely on metadata.
Does my photo viewer/library see EXIF?
Yes. macOS Photos, Windows Photos, Apple Photos, Lightroom, and most photo apps read EXIF for sorting, mapping, and organizing. EXIF GPS data is what powers automatic 'Places' albums and on-map photo placement. This viewer shows you the same data those apps use.
Common Use Cases
Privacy audit
See exactly what your photos reveal — GPS, timestamp, device — before sharing them publicly.
Photography forensics
Verify camera, lens, and capture date for image authenticity in journalism, evidence, or insurance claims.
Equipment review
Check the exact aperture, ISO, and shutter speed for shots you want to recreate.
Locating a photo
Find where a vacation, hiking, or memorable photo was taken using embedded GPS coordinates.
Used-camera shopping
Read shutter count from EXIF (Canon, Nikon, some others embed it) to evaluate used-camera wear.
Stock photo verification
Confirm a stock image was shot with the camera/lens advertised, or that capture dates match licensing claims.
Last updated: