For personal security, I have created a pair of digital keys. These keys are permanently matched to each other. One is the private key, and I have the only copy of it. The other is a public key, which is published here.
Using the public key, you can encrypt any information you want. Once encrypted with my public key, I can decypher the information with my private key. Nobody else can possibly decypher your message to me, because nobody else can use my private key.
PGP stands for Pretty Good Privacy, the original product that creates and uses this type of digital key. Getting a copy of PGP is reasonably cheap, and integrates into your email or filesystem with additional helpful tools. Check out http://www.pgp.com/ for some more information about PGP encryption and security.
Or, better yet, try the GNU Privacy Guard (GPG) for a Free Software alternative (free as in liberty, as well as in cost) to the commercialized PGP product. They're generally mix-and-match compatible, and data encrypted with PGP can be used by GPG seamlessly. More information about GNU and GPG may be found athttp://www.gnupg.org/.
The same public key is published here in two forms. They are identical. The first is a file you can download and add to your keyring. The second is a block of text you can cut and paste into your key manager. Either one will add my public key to your keyring.
Download this file and import it into your PGP (or GPG) key manager program to add my public key to your keyring. Or, cut and paste this block into your PGP key manager program.-----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP for Personal Privacy 5.5.5 mQGiBDZHJeARBADEcwqraadiK8Hy2+w0iJkTgqeai2Z0r2HKocz87WePs7/VYqh/ Wk+WmF33Eu8zLNEia3xvmdXH9Mwl/vLweQjj5KBBUK48e9lmBPU9FIrJmD9kwAWX Ez7bbHR+L4Nmj1s90Ffe8wHMhToapShiqgTTVtZwr2WlHHdHVaF/Smw9sQCg/3ah LMr0vsYlbmr115n39VLADwMD/0Qw3tRjZPwUKdQcHOvwOb+rSZo5r9I40UBZ6xur kOD639xHU1EbvQAHOIAhKjdNtCN39e1pE9e5uRiiJOMIOOYcn7avDCgMEsz1xRqT HdYEzKO7tKEupIvR6aX7f1bJK6p5oCdG2n2n+6dfeSoqaNRhStUH3CFPAcNI6cau ELgjA/9QIgfJq1inVbnXnHAMo04QAHqG96rVrZ/GLnivL/XRdMp3o7dN4Jbjlp// XhBqvFWVZ0Oyka/5ciAfBGJGwxlMIVvqzFYJ35qBEWdu8XAgAFkZbkdXvV51g+j/ srlyflFfO9YC7hr5tbyuhqpuVZzjmKfYupbMUNRbrsTF5rnnmbQYRWQgSGFsbGV5 IDxlZEBoYWxsZXkuY2M+iQBLBBARAgALBQI7Mp+RBAsDAgEACgkQ+ssx8mg9MLTG LACgkaYvzfSghtC7LcbTLXhJFw68vGYAn3NL2eMevtFzzNJ6fJjmeZH/1C6qtBxF ZCBIYWxsZXkgPGVkQGV4cGxvcmF0aS5jb20+iQBLBBARAgALBQI2RyXgBAsDAgEA CgkQ+ssx8mg9MLSuNQCggHoQhog0obd13WusqxSSeURdgI0An1JGjIinN5qkjqQd 3R6L4fA+t/7ruQINBDZHJeAQCAD2Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4 INoBp1ajFOmPQFXz0AfGy0OplK33TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3b zpnhV5JZzf24rnRPxfx2vIPFRzBhznzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9G AFgr5fSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67 VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM 2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XpMgs7AAICB/0QjNAGMf95 QrLfwrIL+PLVyZtHNRyI4ptooDbTA+uBHIta81VnE3WR5UlrqEc6aIG2lquv0hZ4 ZNnri+o3svGSBuBy/ihfmqHMDTrqm2UIL11Yoq2MTkXscxj5fTQY14zGQwni3g3g lud/91YHdAt6Ln+KV/R4YmwbbH+w6IMo8UtCTuVZuA19u/imVeJ1K/c4EA8cUHbM bCNGhmcEPalzjcVhs0BzkDLq6ihO3QF2IikS8zzglIOd5monSugPbTagNs3Hdc+k UsRijJTFgiB2tGSqsJlJLJ/6mp+3o2xPsXHTPI5pw/a1fbJGopjAYjtjWJsHa/kN bIMYMbUsh2R1iQBGBBgRAgAGBQI2RyXgAAoJEPrLMfJoPTC0C7EAoLDDYm2MVJv8 VPF7ZH+paLY5P7dzAJ9Vkntp5p83Watoz6UVFKl4feVWlw== =1CZM -----END PGP PUBLIC KEY BLOCK-----
If you're familiar with how public key cryptography works, you may want to query some of the standard public key servers for my public key, or for other people's keys, rather than use ones posted on the web. Same ease and convenience, and same level of security. However, some keys on a key server may be signed by other PGP/GPG users, building a web of trust as to the authenticity of various keys stored online.
I leave public key server fetching as an exercise for the reader.