Encrypt data

If the user is compromised, he has at least the option to change the key if he wishes.