Skip to main content
Privacy Guide

Do Screenshots Have Metadata?

The short answer: yes. Every screenshot records your device, OS, screen resolution, and timestamp. Here's what that means—and how to strip it before sharing.

What metadata screenshots actually contain

Yes, screenshots contain metadata. When you take a screenshot on any device, the operating system embeds a set of EXIF fields into the image file. This happens automatically—you never opted in, and there's no visible indicator that it happened.

Every screenshot you take records the following:

Device name

e.g., "Niels's MacBook Pro"

OS version

e.g., macOS 15.3, Windows 11 24H2

Screen resolution

e.g., 3024 × 1964 pixels

Date & time

Exact timestamp of capture

Color profile

e.g., Display P3, sRGB

DPI

Dots per inch (typically 72 or 144)

Software

The app that created the screenshot

What screenshots do not contain: GPS location, camera model, lens information, ISO settings, aperture, or any other camera-specific EXIF data. That distinction matters—it's why screenshotting a photo is sometimes used as a quick way to strip location data.

Screenshot 2026-03-14

Your screenshot

Screenshots vs photos: the metadata difference

A photo taken with your phone's camera can embed 30+ EXIF fields. A screenshot embeds 5 to 8. The gap is massive, and it's the reason security researchers treat them differently.

Common misconception: taking a screenshot of a photo strips its location data. This is true—the original GPS coordinates are gone. But the screenshot inherits new metadata from your device. You've traded one set of identifying information for another.

Photo

30+ EXIF fields

GPS Location
Camera Model
Lens Type
ISO Speed
Aperture
Focal Length
Flash Status
Software
Orientation
White Balance
Metering Mode
Shutter Speed

Screenshot

5-8 EXIF fields

Device Name
OS Version
Date & Time
Resolution
Color Profile
That's it. No GPS, no camera data.
Metadata FieldPhotoScreenshot
GPS Location\u2713 Yes\u2717 No
Camera Model\u2713 Yes\u2717 No
Lens Type\u2713 Yes\u2717 No
ISO / Aperture / Shutter\u2713 Yes\u2717 No
Device Name~ Sometimes\u2713 Yes
OS Version~ Sometimes\u2713 Yes
Date & Time\u2713 Yes\u2713 Yes
Resolution\u2713 Yes\u2713 Yes
Color Profile\u2713 Yes\u2713 Yes
Software\u2713 Yes\u2713 Yes

Which platforms strip screenshot metadata?

Not all platforms handle your screenshots the same way. Some strip every trace of metadata on upload. Others preserve everything. Here's what actually happens in 2026, tested platform by platform.

X
Twitter/X
IG
Instagram
in
LinkedIn
WA
WhatsApp
TG
Telegram
DC
Discord
PlatformStrips EXIFStrips FilenameCompressesNotes
Twitter / X\u2713\u2713\u2713Strips all EXIF, renames file, applies compression
Instagram\u2713\u2713\u2713Aggressive compression, strips everything
LinkedIn\u2713\u2717\u2713Strips EXIF, keeps some file properties
WhatsApp\u2713\u2713\u2713Strips as photo; preserves all if sent as document
Telegram~\u2717~Strips as photo; preserves all if sent as "file"
Discord~\u2717\u2717Strips most EXIF, preserves some fields
iMessage\u2717\u2717\u2717Preserves everything including GPS on photos
Email\u2717\u2717\u2717Preserves everything as attachment
Slack\u2717\u2717\u2717Preserves everything, visible to workspace members

The takeaway: if you're sharing screenshots through iMessage, email, or Slack, the recipient gets your full metadata. Strip it before sending if that matters to you.

The AI metadata risk

Metadata on a single screenshot is mostly harmless. But LLMs can now batch-analyze metadata across entire image collections—and that changes the risk profile.

Behavioral profiling

Cross-referencing timestamps and device info across dozens of screenshots builds a pattern: when you work, what tools you use, how many monitors you have, what OS you run.

Corporate intelligence

Screenshots from company Slack channels can reveal internal tool versions, OS update policies, screen resolutions (hinting at hardware budgets), and team sizes.

OSINT reconnaissance

This isn't theoretical. Open-source intelligence analysts already use EXIF data as a starting point for investigations. AI just makes it faster and cheaper.

The individual data points are mundane. The aggregate is not. If you're sharing screenshots publicly or with people you don't fully trust, stripping metadata is a low-effort, high-payoff habit.

How to strip metadata before sharing

Four methods, from quick to automated. Pick whichever fits your workflow.

1

macOS Preview

Open the screenshot in Preview. Go to File → Export. Uncheck options under “More Options” to strip color profile and metadata. Save as a new file.

2

Finder → Get Info

Right-click the file, select Get Info. Under “More Info,” you can view (but not always remove) metadata. For full removal, use Preview or a dedicated tool.

3

ScreenshotEdits

Exports strip metadata by default. Every time you beautify, annotate, or edit a screenshot and export it, the output contains zero EXIF data. No extra steps.

4

Online tools

Sites like verexif.com or jimpl.com can strip metadata. Use with caution—they upload your files to their servers, which is ironic for a privacy-focused task.

Frequently asked questions

Do screenshots have EXIF data?
Yes. Screenshots embed a subset of EXIF data including device name, OS version, screen resolution, color profile, DPI, and timestamp. They don't include GPS, camera model, or lens data like photos do.
Can someone find my location from a screenshot?
Not from the metadata alone. Screenshots don't embed GPS coordinates. However, the content of the screenshot—visible addresses, map tiles, Wi-Fi network names, or browser tabs showing location-specific searches—could reveal your location indirectly.
Does screenshotting a photo remove GPS data?
Yes. The original photo's EXIF data (including GPS) is replaced entirely. The screenshot gets new metadata from your device: your device name, OS version, and the timestamp of when you took the screenshot.
Does iMessage strip photo metadata?
No. iMessage preserves full EXIF data including GPS location. If you send a photo via iMessage, the recipient can extract your exact coordinates from the file. Use AirDrop with the same caveat. Strip metadata before sending if this concerns you.
Do screenshots contain my device name?
Yes. On macOS, your device name (e.g., "Niels’s MacBook Pro") is embedded in the EXIF Software and Host Computer fields. On iOS, the device model is included. This is set in System Settings > General > About.
How do I remove metadata from a screenshot on Mac?
Three ways: (1) Open in Preview, use File > Export and uncheck metadata options. (2) Use Terminal with exiftool: exiftool -all= filename.png. (3) Use ScreenshotEdits, which strips metadata from every export automatically.
Does ScreenshotEdits preserve or strip metadata?
ScreenshotEdits strips metadata from exported files by default. When you edit a screenshot and export it, the output contains no EXIF data—device name, OS version, timestamps, all removed. Nothing to configure.

Strip metadata automatically

ScreenshotEdits removes EXIF data from every export. Edit, beautify, and share screenshots without leaking device info.

Related tools & guides