Remove EXIF Metadata from Photos with exiftool
Sometimes, it is a good idea to scrub EXIF metadata from photos before sharing them, and there is no better tool for the job than exiftool. The command below nukes all EXIF metadata in a photo in one fell swoop (replace foo.jpg with the actual file name):
exiftool -all= foo.jpg
This command removes EXIF metadata from the specified photo, but what if you need to process multiple photos? Then you can use the following command which cleans all the photos in the current directory:
for i in *.jpg; do echo "Processing $i"; exiftool -all= "$i"; done
Instead of purging all EXIF metadata from a photo, you can also remove individual fields. For example, the following command can come in handy when you need to remove geographical coordinates embedded in the photo:
exiftool -geotag= foo.jpg
And the command below can help you to remove geotags from multiple photos in one go:
for i in *.jpg; do echo "Processing $i"; exiftool -geotag= "$i"; done
other geographical data...One of my camera stores GPS data in a different tag, so I use
[code]exiftool -gps:all= *.jpg[/code]
to remove the information
ExifTool processes directoriesYou can specify a directory name in an ExifTool command:
exiftool -all= SOME_DIRECTORY
And add a -r option to recursively process subdirectories too.
This will process any type of file that is writable by ExifTool, but if you only want to process jpeg images, add "-ext jpg" and maybe "-ext jpeg" to the command. (No need to add "-ext JPG" because the -ext option is case insensitive).
More info on exiftoolNote that exif tool does accept wildcards so for the sort of thing that many people need:
exiftool -r -overwrite_original -P -all= -copyright="My Name" *.jpg *.jpeg *.JPG
Might be more to the point.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm