I’ve been trying to make sense of this post but something is missing.
Where (or when) is the actual encryption happening?
The only conclusion I could come up with was that the source is already encrypted. Otherwise, how can you go from not encrypted to encrypted without ever sharing the key with the remote, which is the whole goal of this exercise - data on remote shall never be decrypted at any time.
Sadly, that user was a one time poster on the old forum and does not appear to exist on this forum.