It sound like he knows what he is doing and trying to get some help, but sometimes the Anons are like a herd of Cats.
My coding experience was in the 70s, and a bit in the early 80s, before the idea of Hacking even existed.
The questions would be If you had the encryption key, could you use it on Q posts to find the IP address, then go to the site and use the key to unlock the contents? I assume that is what is happening.
Q uses something akin to TOR, a series of rapid successive hops through anonymizing servers, so one cannot tell the true IP address of the original source, from the final message.