Hi dsm,
What a cunning plan you have! I have some information and food for thought.
A Synology NAS that is a remote key client can not be a remote key server at the same time, and vice versa. In other words, the NASs can not be each other’s remote key server while being each other’s remote key clients. A remote key server, however, can store client keys from different volumes and different NASs.
As far as I know, the key client-server connection must be local, but a VPN connection might work. I have no information about that or experience with it, but it is on my to-do list.
Assuming that a remote key client-to-server connection works over Tailscale, a stolen NAS that is the client won’t be able to connect to the remote key server from a location that is not part of your Tailscale VPN. It is good to test that scenario, but this is the theory so far. Again, this is for the to-do list.
Having both NASs fitted with an encrypted volume is unnecessary since you can encrypt the backup. Don’t forget to store the password for that backup properly.
More: You plan to trust the transport of your encryption key to a third party. Consider the potential risks regarding the trustworthiness and availability of this service.
For example, if you restart your NAS after a DSM upgrade and Tailscale is temporarily out of service, your volume remains locked until the connection is re-established unless you apply the recovery key.
Last: when you (plan to) implement volume encryption or any form of storage encryption, plan your recovery key storage. The key must always be available for you or other authorized persons and never to any unauthorized person.
Finally, periodically test the recovery procedure. Preferably, have it written down to ensure it works when needed.
Tip: when you encrypt a volume, consider a small unencrypted volume on the same NAS for applications you can’t live without in case of a locked volume. This is about balancing risks (prying eyes versus availability).