DISCLAIMER: Frei is a first time user, I swear he's not a sockpuppet from me.
Thank you very much for this statement.

Back to the concept: Do I understand your concept, that you own the entry- and exit-points? So I think it is the same marketing as "multihop" vpn-providers, which solves some problems, but not the main problem: You need to trust the operator.
For example: If you look at the FAQs from Jondonym:
https://anonymous-proxy-servers.net/en/faq-jondo.html#1b"A Mix Operator can only determine a relationship between the incoming and outgoing connections to his mix server and must, in fact, do this to ensure that the data packets were correctly transferred. If the user uses a mix cascade consisting of more than one independently run mix, the mix oerator of one single mix in the chain cannot determine a relationship between the user and the websites visited. For this reason, we especially point out that the "Dresden" mix cascade is for test purposes and is run solely by members of the TU Dresden. Whoever uses this cascade is protected from external observation, but the TU Dresden could theoretically observe everything."
But it could be, that I do not understand your concept correct. Can you please explain the difference to this Jondonym, or TOR?
frei
No I don't own the entry and exit points, do you know what I2P is?
If you access a Tor hidden service, does the hidden service owner own the entry?
You entry to I2VPN
using I2P, that means, I2P will route your traffic via a group of computers
which I don't own, neither do you, so after reaching I2VPN main, I can't trace those traffic to your IP, but to your computer using I2P tunnel, then, I2VPN main will connect to I2VPN exit using
I2P again, so exit can't find either main nor you...