At the end point, it is only the tor exit node that can be identified by sites or ISP, and the owner of end node doesn't have a clue what is the origin of the encrypted data. ...
custom home made encryptions? maybe to get a connection with the person living in the room next to you who uses the same custom made encryption :) The idea of tor is working...