DISCLAIMER: Frei is a first time user, I swear he's not a sockpuppet from me.
Thank you very much for this statement.

Back to the concept: Do I understand your concept, that you own the entry- and exit-points? So I think it is the same marketing as "multihop" vpn-providers, which solves some problems, but not the main problem: You need to trust the operator.
For example: If you look at the FAQs from Jondonym:
https://anonymous-proxy-servers.net/en/faq-jondo.html#1b"A Mix Operator can only determine a relationship between the incoming and outgoing connections to his mix server and must, in fact, do this to ensure that the data packets were correctly transferred. If the user uses a mix cascade consisting of more than one independently run mix, the mix oerator of one single mix in the chain cannot determine a relationship between the user and the websites visited. For this reason, we especially point out that the "Dresden" mix cascade is for test purposes and is run solely by members of the TU Dresden. Whoever uses this cascade is protected from external observation, but the TU Dresden could theoretically observe everything."
But it could be, that I do not understand your concept correct. Can you please explain the difference to this Jondonym, or TOR?
frei