The biggest upside is that you actually get anonymity. In some cases it can be partially computationally based anonymity as well instead of probabilistic route selection based anonymity. So more like encryption than Tor. You are anonymous until the attacker solves this hard marth problem, instead of you are anonymous until the attacker watches these two locations. The reason Tor, VPN, Proxy and I2P are dead/dying is because it turns out that it actually isn't that hard for an attacker to watch two arbitrary locations, and some attackers like NSA solve the problem by watching all locations.