← Back to Blog
Privacy

How to Protect Your Privacy When Editing Photos Online

Before you upload family photos to that free editing tool, read this. A practical checklist for keeping your images private.

My mom called me on a Tuesday night in April. She’d found a “free photo editor” through a Facebook ad and used it to crop and resize a dozen family photos from my niece’s birthday party. Cute stuff. A three-year-old smashing cake everywhere. Two weeks later, that website showed up on Have I Been Pwned with a note that 1.4 million uploaded images had been exposed. Including hers.

I spent the next hour helping her change passwords and check her credit reports. The photos themselves weren’t the worst thing to leak. But her phone had geotagged them, so the EXIF data attached to each file included the exact GPS coordinates of my brother’s house. His address. Where his kid sleeps. That’s when I got serious about checking how online image tools handle your files.

If you edit photos in your browser, you need a privacy checklist. Here’s mine.

The 5-step privacy check I run on every tool

I do this before I trust any new image editing website with my files. It takes about three minutes.

1. Check for HTTPS

Look at the URL bar. If it says “http://” without the S, close the tab. No exceptions. HTTPS encrypts the connection between your browser and the server. Without it, anyone on your WiFi network can see the files you’re uploading. I checked this on 30 random “free image editor” sites last month. Four of them were still on plain HTTP. One was a tool with 2 million monthly visitors.

2. Skim the privacy policy for “data use” language

You don’t need to read the whole thing. Search the page for words like “sell,” “share,” “third party,” and “training.” If the policy says they can use your uploads to improve their services or share data with partners, your images might end up somewhere you didn’t intend. One popular compression tool I tested had a clause saying uploaded images “may be used to enhance our AI models.” I noped out of there fast.

3. Check if they require an account

If a tool asks you to create an account before you can compress a single JPG, ask yourself why. Your email address plus your uploaded images gives them a tidy user profile. Tools that process files locally in your browser don’t need an account at all. The file never touches their servers, so there’s nothing to log you in for.

4. Look for “local processing” or “client-side” language

This is the most important check. Tools that process images in your browser using JavaScript never send your files anywhere. The transformation happens on your device. The giveaway is the wording on the page. If the tool says “upload your image,” it needs a server. If it says “choose a file” or “drop your image here” and mentions client-side processing, the file stays put. Make this a habit. Before you use any new tool, spend ten seconds scanning the page for that language.

5. Watch the network tab in DevTools

This sounds technical but it’s surprisingly simple. Open Chrome or Firefox, press F12, click the “Network” tab, then upload a test image to the tool. If you see POST requests sending your file to a server, your image is leaving your device. If you see nothing (or only small analytics pings), the tool is processing locally. I tested this on 15 popular image tools. Eight of them uploaded every file to a remote server within two seconds of me dropping it in.

Red flags that should make you nervous

Trust your gut. If something feels off, it probably is.

They want your email before you can do anything. Free tools that gate basic features behind registration are building a user database. Your photos plus your email is valuable data. I once registered for a “free background remover” and got three promotional emails in the first week. Unsubscribing didn’t work. Had to block the domain.

The privacy policy is vague. Phrases like “we may collect certain information” or “data is processed by trusted partners” without naming those partners are bad signs. A good privacy policy tells you exactly what’s collected, how long it’s stored, and who sees it.

Heavy ad tracking. If the site has six different ad networks loading trackers in the background, they’re probably in the data business, not the image editing business. I ran uBlock Origin on one tool and counted 23 blocked tracking scripts on a single page.

No mention of how or when files are deleted. Server-based tools should tell you how long they keep your uploads. If they don’t say, assume they keep them forever.

Green flags that signal a safe tool

These are the things I look for that tell me a tool is taking privacy seriously.

Clear “local processing” statement. Not buried in a privacy policy, but right on the page where you drop your files. ImgPrism says it plainly on every tool page. Everything stays on your machine.

No account required. You show up, edit your image, download it, and leave. No email, no password, no profile. That’s how it should be for a utility tool.

Minimal or no tracking cookies. Open DevTools, go to Application, check Cookies. A privacy-respecting tool might have one cookie for session preferences and nothing else. If you see double-digit cookie counts before you’ve even uploaded anything, that’s a warning sign.

Open source code. If you can read the source code, you can verify the claims. Some browser-based tools are fully open source on GitHub, so you can see for yourself that nothing gets uploaded.

Which tools are safe? A quick comparison

I tested a bunch of popular image tools to see where files really go. Here’s what I found.

ToolWhere files are processedAccount requiredTracking
ImgPrismLocally in browserNoMinimal
Squoosh (Google)Locally in browserNoGoogle analytics
TinyPNGUploaded to serverNoModerate
iLoveIMGUploaded to serverOptionalHeavy
CanvaUploaded to serverYesHeavy
remove.bgUploaded to serverOptionalModerate
Compressor.ioUploaded to serverNoModerate

The pattern is clear. Tools that process in the browser don’t need your data because they never touch it. Tools that upload to a server need your data, at least temporarily, and the question is what they do with it after. Build the habit of checking before you drop a file.

How I handle sensitive images

Some photos deserve extra care. Medical documents scanned as images, ID cards, family photos with kids, anything with visible addresses or license plates. Here’s my routine.

First, I strip EXIF data before editing. Most phones embed GPS coordinates, camera model, and timestamp into every photo. You can remove this in most operating systems without any special tool. On Mac, open the image in Preview, click Tools, then Show Inspector, and delete the metadata. On Windows, right-click the file, go to Properties, and remove personal information.

Second, I only use browser-based tools that process files locally for sensitive images. Server-based tools are fine for generic stuff like compressing a screenshot for a blog post. But for anything personal, local-only.

Third, I crop out identifying details before uploading. If a photo shows my street sign or house number in the background, I crop that part out first. Takes ten seconds.

Fourth, I use a test image first. Before I trust a new tool with real photos, I run a blank or generic test image through it while watching the network tab. If nothing uploads, I proceed with the actual file.

Keep your photos to yourself

The convenience of free online tools is real. I use them daily. But convenience shouldn’t cost you your privacy. Run the checks I described above, pay attention to where your files actually go, and stick with tools that process everything locally in your browser.

If you want a tool that passes every check on this list, try ImgPrism. But more importantly, run the five-step test yourself. Build the habit. Once you start checking, you’ll be surprised how many tools fail.

Try Image Compressor Free

No signup. No upload. Everything runs in your browser.

Compress your images now