Firsthand account of NSA sabotage of Internet security standards

The key would be something known only to myself and the recipient of course and NOT transmitted online or through a cellphone. Really, I was using the example of sending private notes to the wife only as an example. I’m too old to worry about someone reading an email wherein I tell my wife how much I love her. I was actually more concerned with moving files. This really only pertains to myself and a couple of guys that I grew up with and usually involves music that we’re writing. Paranoid? Sure. Why not. It actually started as a joke where we were kidding around about how to keep someone from stealing our ideas. I had the idea to use TrueCrypt to encrypt it and then to encrypt THAT file also. There’s no way for an outsider to get the key as it’s a pretty long involved in-joke between the three of us and has numerous, deliberate misspellings. The whole article got me thinking about safe communications though and how to keep the TLA’s from getting into my business no matter what it might be, hence my question regarding that particular encryption scheme.

I appreciate all the answers though! It’s definitely given me some things to think on and research.