It is not my system (neither the design nor the implementation), I am just advising the people implementing it some. It is also not their design but is entirely from academic whitepapers from accomplished security experts in academia. I don't want to say much, but in general, layer encrypted, multi-node routed, time delayed, uniformly padded messages mixed with cover traffic for forward anonymity, distributed PIR (not everybody gets everything or information theoretically secure though) for message retrieval, ECC, AES-256-CTR for message payload encryption.