said by Blackbird:The cost of true traffic security is invariably a certain loss of anonymity in order to verify key-holder ownership, at least to some degree...
Not necessarily, if P2P is involved in design (and they've specifically mentioned it) and keys are generated (and then immediately destroyed) on the fly - there is no need to forfeit anonymity (as opposite to centralize based PKI). Here is example of similar (only by the idea behind) implementation -
ZRTP.
Authors are practicing quite rare
privacy-by-design approach, which shows respect to the end user, not to any other third party entities (government, private snoopers, marketeers, etc). And they've committed to making source code of the new technology available publicly. It's yet another sign of true user-oriented intentions behind the project. That, IMHO, brings confidence to this privacy solution (along with well known authors, standing behind it).
Good to hear that there are still some folks, who care about privacy or people.