What metadata screenshots actually contain
Yes, screenshots contain metadata. When you take a screenshot on any device, the operating system embeds a set of EXIF fields into the image file. This happens automatically—you never opted in, and there's no visible indicator that it happened.
Every screenshot you take records the following:
Device name
e.g., "Niels's MacBook Pro"
OS version
e.g., macOS 15.3, Windows 11 24H2
Screen resolution
e.g., 3024 × 1964 pixels
Date & time
Exact timestamp of capture
Color profile
e.g., Display P3, sRGB
DPI
Dots per inch (typically 72 or 144)
Software
The app that created the screenshot
What screenshots do not contain: GPS location, camera model, lens information, ISO settings, aperture, or any other camera-specific EXIF data. That distinction matters—it's why screenshotting a photo is sometimes used as a quick way to strip location data.
Your screenshot
Screenshots vs photos: the metadata difference
A photo taken with your phone's camera can embed 30+ EXIF fields. A screenshot embeds 5 to 8. The gap is massive, and it's the reason security researchers treat them differently.
Common misconception: taking a screenshot of a photo strips its location data. This is true—the original GPS coordinates are gone. But the screenshot inherits new metadata from your device. You've traded one set of identifying information for another.
Photo
30+ EXIF fields
Screenshot
5-8 EXIF fields
| Metadata Field | Photo | Screenshot |
|---|---|---|
| GPS Location | \u2713 Yes | \u2717 No |
| Camera Model | \u2713 Yes | \u2717 No |
| Lens Type | \u2713 Yes | \u2717 No |
| ISO / Aperture / Shutter | \u2713 Yes | \u2717 No |
| Device Name | ~ Sometimes | \u2713 Yes |
| OS Version | ~ Sometimes | \u2713 Yes |
| Date & Time | \u2713 Yes | \u2713 Yes |
| Resolution | \u2713 Yes | \u2713 Yes |
| Color Profile | \u2713 Yes | \u2713 Yes |
| Software | \u2713 Yes | \u2713 Yes |
Which platforms strip screenshot metadata?
Not all platforms handle your screenshots the same way. Some strip every trace of metadata on upload. Others preserve everything. Here's what actually happens in 2026, tested platform by platform.
| Platform | Strips EXIF | Strips Filename | Compresses | Notes |
|---|---|---|---|---|
| Twitter / X | \u2713 | \u2713 | \u2713 | Strips all EXIF, renames file, applies compression |
| \u2713 | \u2713 | \u2713 | Aggressive compression, strips everything | |
| \u2713 | \u2717 | \u2713 | Strips EXIF, keeps some file properties | |
| \u2713 | \u2713 | \u2713 | Strips as photo; preserves all if sent as document | |
| Telegram | ~ | \u2717 | ~ | Strips as photo; preserves all if sent as "file" |
| Discord | ~ | \u2717 | \u2717 | Strips most EXIF, preserves some fields |
| iMessage | \u2717 | \u2717 | \u2717 | Preserves everything including GPS on photos |
| \u2717 | \u2717 | \u2717 | Preserves everything as attachment | |
| Slack | \u2717 | \u2717 | \u2717 | Preserves everything, visible to workspace members |
The takeaway: if you're sharing screenshots through iMessage, email, or Slack, the recipient gets your full metadata. Strip it before sending if that matters to you.
The AI metadata risk
Metadata on a single screenshot is mostly harmless. But LLMs can now batch-analyze metadata across entire image collections—and that changes the risk profile.
Behavioral profiling
Cross-referencing timestamps and device info across dozens of screenshots builds a pattern: when you work, what tools you use, how many monitors you have, what OS you run.
Corporate intelligence
Screenshots from company Slack channels can reveal internal tool versions, OS update policies, screen resolutions (hinting at hardware budgets), and team sizes.
OSINT reconnaissance
This isn't theoretical. Open-source intelligence analysts already use EXIF data as a starting point for investigations. AI just makes it faster and cheaper.
The individual data points are mundane. The aggregate is not. If you're sharing screenshots publicly or with people you don't fully trust, stripping metadata is a low-effort, high-payoff habit.
How to strip metadata before sharing
Four methods, from quick to automated. Pick whichever fits your workflow.
macOS Preview
Open the screenshot in Preview. Go to File → Export. Uncheck options under “More Options” to strip color profile and metadata. Save as a new file.
Finder → Get Info
Right-click the file, select Get Info. Under “More Info,” you can view (but not always remove) metadata. For full removal, use Preview or a dedicated tool.
ScreenshotEdits
Exports strip metadata by default. Every time you beautify, annotate, or edit a screenshot and export it, the output contains zero EXIF data. No extra steps.
Online tools
Sites like verexif.com or jimpl.com can strip metadata. Use with caution—they upload your files to their servers, which is ironic for a privacy-focused task.
Frequently asked questions
Do screenshots have EXIF data?
Can someone find my location from a screenshot?
Does screenshotting a photo remove GPS data?
Does iMessage strip photo metadata?
Do screenshots contain my device name?
How do I remove metadata from a screenshot on Mac?
Does ScreenshotEdits preserve or strip metadata?
Strip metadata automatically
ScreenshotEdits removes EXIF data from every export. Edit, beautify, and share screenshots without leaking device info.