So no one wants to touch this one, huh? Let me ask a simpler question then. A client wants to send me data, but insists that it must be encrypted. I'm like "cool". They say, "send me your public key".
Networked computing is a double-edged sword. Connectivity makes transparent sharing of data through e-mail, Web sites, and ftp archives possible, but it also invites unwanted access to your data.