Text this: Location-Based Cryptographic Techniques for Data Protection