{"id":52913,"date":"2025-01-24T09:34:24","date_gmt":"2025-01-24T14:34:24","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=52913"},"modified":"2025-01-24T09:34:24","modified_gmt":"2025-01-24T14:34:24","slug":"how-to-remove-metadata","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/how-to-remove-metadata\/52913\/","title":{"rendered":"Metadata: Uncovering what&#8217;s hidden inside"},"content":{"rendered":"<p>If you\u2019re anything like me, you probably share plenty of photos, videos and documents, and send lots of voice messages and emails every single day too. But how often do you stop to consider the additional data contained in these files? For each of these files\/media contains metadata \u2014 which can reveal a lot of interesting details not meant for prying eyes; for example, a photo\u2019s time and location, a document\u2019s editing history, device information, IP address, geolocation, and much more. So, for example, whenever you post an innocent selfie on social media, you\u2019re also making public a whole ton of extra information that you might not necessarily want others to see.<\/p>\n<p>In this article, we explore the pros and cons of metadata and how to remove it.<\/p>\n<h2>What is metadata and what\u2019s it for?<\/h2>\n<p>To put it simply, metadata is additional information about a file\u2019s content. Such data is added to files by applications that create or process them, operating systems, or users themselves. In most cases, metadata is created and updated automatically. For example, for files, this can include the creation date, last modified date, type, owner, and so on. In the case of photos, metadata can include the date and location, exposure settings, camera or smartphone model, and so on, recorded in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Exif\" target=\"_blank\" rel=\"nofollow noopener\">Exif<\/a> format. Specifically which data is stored depends on the camera\/smartphone model and settings.<\/p>\n<p>Some metadata is \u201cvisible\u201d and easy to edit. For example, audio files contain special tags describing the content \u2014 author, artist, album, track name, genre, etc. \u2014 that can be easily changed in any media player.<\/p>\n<p>Other metadata is less evident. Did you know, for example, that from the metadata of an office document you can easily discover who edited it, when, for how long, and using which programs? In some cases, you can even restore the entire edit history from the first keystroke.<\/p>\n<p>Of course, metadata wasn\u2019t originally designed to be \u201cthe perfect <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/how-to-avoid-cyberstalking\" target=\"_blank\" rel=\"noopener nofollow\">stalking<\/a> tool\u201d, but simply a useful feature. However, you can end up sharing more than you intended; for example, your employer or client could find out how much time you actually spent working on a document, and the Exif data of a selfie you post online can reveal what smartphone you use and where you were at the time. Metadata can also help catch criminals or uncover fraudulent schemes.<\/p>\n<p>For example, in 2019, U.S. law enforcement managed to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/it-executive-steals-6-million-busted-by-word-doc-metadata\/\" target=\"_blank\" rel=\"nofollow noopener\">arrest the fraudster<\/a> Hicham Kabbaj, who\u2019d been sending his former employer invoices for equipment supplies from a shell company called Interactive Systems for four years. Of course, no equipment was actually supplied, but a total of six million dollars was transferred into Interactive System\u2019s accounts. The fraudster was eventually caught out because of simple oversight: four of the 52 invoices were in the MS Word <em>.doc<\/em> format, and the metadata listed the author as KABBAJ.<\/p>\n<p>Besides the police, malicious actors can also use metadata. In 2016, we <a href=\"https:\/\/www.kaspersky.com\/blog\/exif-privacy\/13356\/\" target=\"_blank\" rel=\"noopener nofollow\">conducted an experiment<\/a> to try to determine a person\u2019s location from a single photo. For us, this was just a fun exercise, but criminals could have very different motives.<\/p>\n<p>Or consider a slightly more complex scenario: your innocent PDF file somehow ends up in the hands of a malicious actor. How it got there doesn\u2019t matter \u2014 let\u2019s say they introduced themselves as your colleague. In this case, the contents of the file may be of no interest to the criminal. What\u2019s important to them, however, is that you\u2019ve already taken the bait (so the attack can continue) and leaked the PDF\u2019s metadata \u2014 revealing the software and version you used to create it. With this knowledge, the attacker can send you malware specifically designed to exploit a vulnerability in your particular system. Protecting yourself from this kind of scenario requires a combination of measures: <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">ignoring suspicious messages<\/a>, removing metadata, and <a href=\"https:\/\/www.kaspersky.com\/blog\/software-updater-tip\/13270\/\" target=\"_blank\" rel=\"noopener nofollow\">updating your software promptly<\/a>.<\/p>\n<h2>How to remove metadata<\/h2>\n<p>You can remove metadata using built-in tools or third-party programs and services. We recommend the former, as then your metadata won\u2019t end up in the hands of third parties this way. Third-party tools act as an extra layer between you and the \u201ccleaned\u201d file. This layer could potentially retain metadata, which criminals could somehow get hold of.<\/p>\n<p>So now let\u2019s look at how to remove metadata from photos and videos, and DOC and PDF files using built-in tools.<\/p>\n<h3>Photos and videos<\/h3>\n<h4>On Windows<\/h4>\n<p>In <strong>File Explorer<\/strong>, right-click on the file, select <strong>Properties<\/strong>, and go to the <strong>Details<\/strong> tab. At the bottom of the screen, click <strong>Remove Properties and Personal Information<\/strong>, and in the window that opens, either keep the default option <strong>Create a copy with all possible properties removed<\/strong>, or manually select the properties you want to remove, and click <strong>OK<\/strong>.<\/p>\n<h4>On macOS and iOS.<\/h4>\n<p>Apple operating systems let you remove or modify the date, time, and geolocation. However, location data is only recorded for photos and videos taken with geolocation services enabled.<\/p>\n<p>To remove or modify metadata on a macOS device, open the <strong>Photos<\/strong> app, go to the <strong>Image<\/strong> menu, select <strong>Location<\/strong>, and click <strong>Hide Location<\/strong>. Here you can also <strong>Revert to Original Location<\/strong> \u2014 which raises the question of where this data is actually stored \u2014 or <strong>Assign Location<\/strong> to one or more photos after you <strong>Copy Location<\/strong> from another photo. Additionally, in the <strong>Image<\/strong> menu, you can <strong>Adjust Date and Time<\/strong> of the capture.<\/p>\n<p>On an iPhone or iPad, open the <strong>Photos<\/strong> app, select the photo to edit, and tap the \u24d8 info button, or simply swipe up on the photo. Here, you can <strong>Adjust<\/strong> the date, time, and location. For location, you can either select <strong>No Location<\/strong> or assign any other location to the photo. (This is useful if you\u2019re posting photos taken in a studio near your home, while pretending to be in, say, Maldives.) To edit multiple photos at once, select them all, tap the three-dot button <strong>(\u2026)<\/strong>, then choose <strong>Adjust Date &amp; Time<\/strong> or <strong>Adjust Location<\/strong>.<\/p>\n<h4>On Android<\/h4>\n<p>On Android devices, you can remove or modify location data using the <strong>Google Photos<\/strong> app. Select the photo or video, tap the three-dot <strong>More<\/strong> icon, select <strong>Edit<\/strong>, and tap <strong>Remove location<\/strong>.<\/p>\n<h3>DOC files<\/h3>\n<p>If you\u2019re using Word, go to the <strong>File<\/strong> tab and select <strong>Info<\/strong>. Then click <strong>Check for Issues<\/strong>, followed by <strong>Inspect Document<\/strong> and <strong>Inspect<\/strong>. Under <strong>Document Properties and Personal Information<\/strong>, click <strong>Remove All<\/strong>.<\/p>\n<p>Windows users can also remove DOC file metadata using <strong>File Explorer<\/strong>, just as they would with photos and videos.<\/p>\n<h3>PDF files<\/h3>\n<p>If you\u2019re using Adobe Acrobat, go to <strong>File<\/strong>, then <strong>Document properties<\/strong>, and select <strong>Description<\/strong>. In the window that opens, you can manually edit the author, subject, keywords, and title of the document. Clicking <strong>Additional Metadata<\/strong> opens a window displaying all the document\u2019s metadata.<\/p>\n<p>You can also remove PDF metadata using <strong>File Explorer<\/strong> in the same way as for photos and videos.<\/p>\n<h2>Security Measures<\/h2>\n<p>So, what\u2019s the main way to protect yourself from malicious actors exploiting your metadata? Two words: exercising caution. In addition, for maximum security, follow these extra precautions:<\/p>\n<ul>\n<li><strong>Set your social media profiles to private. <\/strong>This way, attackers won\u2019t be able to use the metadata from your old photos and videos.<\/li>\n<li><strong>Use a <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive security solution<\/a>. <\/strong>It will act as a safety net \u2014 protecting your payment and personal data even if you fall victim to a cybercriminal.<\/li>\n<li><strong>Remove metadata regularly. <\/strong>At first, this may seem like a lot of extra work just to send a simple selfie, but over time, removing metadata will become second nature.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Every file, video, etc. we share contains a lot of hidden additional information \u2014 metadata. What&#8217;s it for, and is it really necessary?<\/p>\n","protected":false},"author":2754,"featured_media":52914,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[176,2534,1864,76,43,422,131],"class_list":{"0":"post-52913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-documents","9":"tag-geolocation","10":"tag-metadata","11":"tag-phishing","12":"tag-privacy","13":"tag-threats","14":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-remove-metadata\/52913\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-remove-metadata\/28472\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-remove-metadata\/23728\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-remove-metadata\/28603\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-remove-metadata\/38937\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-remove-metadata\/28727\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-remove-metadata\/34558\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-remove-metadata\/34184\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/metadata\/","name":"metadata"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2754"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=52913"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52913\/revisions"}],"predecessor-version":[{"id":52916,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52913\/revisions\/52916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/52914"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=52913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=52913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=52913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}