Hacker Newsnew | past | comments | ask | show | jobs | submit | cope123's commentslogin

I’ve been looking into how image metadata works recently, and I was surprised how many photos still contain GPS coordinates, timestamps, and device information — even after being shared across platforms.

A lot of people assume social networks automatically remove everything, but that’s not always consistent. And when images are shared via email, cloud storage, forums, or marketplaces, the metadata often stays intact.

It made me think about how invisible this problem is. You can’t see EXIF data when you look at a photo normally, yet it can reveal precise location details.

For people working remotely, selling items online, or just posting casually, this feels like an overlooked privacy issue.

Curious how others here handle this: - Do you rely on platforms to strip metadata? - Do you disable location services entirely? - Or do you clean images manually before sharing?

Would love to hear how others approach this.


Most online tools that remove EXIF metadata require uploading images to a server, which feels a bit ironic for a privacy-related task.

I’m curious how people here think about client-side approaches for this kind of problem: performance limits, browser APIs, edge cases with large images, and whether users actually trust “runs in your browser” claims.

Link: https://exif-cleaner.com/


A simple web tool that removes EXIF metadata (location, device info, etc.) from images directly in the browser, without uploading files to a server.

I’m curious how people here think about client-side vs server-side approaches for this kind of privacy tool, especially around performance, large images, and batch processing.


I’ve been thinking about how much hidden context photos carry today.

Beyond the image itself, many photos include GPS location, timestamps, device info, and other metadata that isn’t visible unless you inspect the file.

It feels like a lot of people assume platforms handle this automatically, but in practice photos are often shared via email, forums, support tickets, docs, or cloud storage where metadata stays intact.

Curious how people here approach this:

– Do you treat photos as sensitive files by default? – Have you seen real privacy or security issues caused by EXIF/GPS data? – Do you rely on platforms to strip metadata, or do you handle it yourself?

Interested in perspectives from security, infra, OSINT, or anyone who’s changed how they think about “harmless” images.


Containers assumed reviewed code. AI agents break that assumption.

The interesting shift here isn’t Docker vs microVMs, it’s that “execute first, reason later” has become normal — and that forces isolation to move down to the kernel boundary.


AI reduces the cost of writing code, not the cost of deciding what should exist.

Engineers who already understood users and systems get more leverage; engineers who only wrote code feel replaced. That difference existed long before AI.


For a long time, I think most people (including me) treated images as inert files — just pixels you can safely share anywhere.

Digging deeper into image metadata changed that perspective quite a bit. Modern photos can contain precise GPS coordinates, timestamps, device identifiers, and even traces of editing software — often without users being aware of it.

What surprised me most is how often images are shared outside major platforms (forums, documentation, support tickets, marketplaces, blogs) where metadata is not reliably stripped.

I’m curious how people here think about this:

– Do you personally treat images as potentially sensitive files? – Have you seen real-world privacy or security issues caused by image metadata? – Do you rely on platforms to sanitize images, or do you handle it yourself?

Interested in hearing experiences from security, OSINT, journalism, or anyone who’s had a “wait, that was in the image?” moment.


Image files often contain more information than what’s visible on screen: GPS coordinates, device identifiers, timestamps, and software history.

In many environments, images are shared assuming they are inert files, but that assumption doesn’t always hold.

Curious how often image metadata is considered in security practices, audits, or threat models, and whether people treat it as a real attack or privacy surface.


Hi, what kind of problem are you having? Vibe coding itself isn’t really the issue — the bigger challenge is coming up with an idea and figuring out how it can be monetized. AI is great for helping you build whatever you have in mind, as long as it doesn’t require true innovation. At least from my perspective, AI can’t really conceive and create something genuinely new — or at least not in the way we currently use it.

I watched your video and what you’re saying about code quality and refactoring absolutely makes sense. On the other hand, if vibe coding gives you a chance to build something you find interesting, it’s sometimes perfectly fine to move fast, get to an MVP, and see whether it actually makes sense.

Either way, it’s a cool topic for discussion.


The video is of a person called ThePrimeagen, who is a very successful ex-netflix engineer who live-streams to a pretty massive audience, and almost certainly not the person who posted the video.


I’ve been looking more closely at image metadata lately and was surprised how often GPS coordinates are still embedded in photos people share publicly.

Outside of major social networks, many platforms (forums, blogs, marketplaces, email, messaging apps) don’t reliably strip EXIF data, and GPS location seems to be the most sensitive part that goes unnoticed.

I’m curious how people here think about this in practice: – Do you assume photos you share still contain location data? – Have you ever seen real-world privacy or security issues caused by GPS metadata in images? – Do you rely on platforms to remove metadata, or do you clean images yourself before sharing?

Interested in perspectives from people working with security, OSINT, journalism, or anyone who’s learned about this the hard way.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: