I wrote that the proposed system was
inspired by the TOR network, not that it literally uses the TOR network. To send a message across the TOR network, you wrap it in a bunch of layers of encryption, and then each TOR node removes one layer: that's the similar aspect.
Your other critiques are all valid. There's still a lower bound on the total time required for full decryption. I was just trying to show that that is possible.