pull down to refresh

It doesn't explain it. The only hint I see is here:
In Obscura, we only control the first hop and use blind third-party relays for the exit hop. The result is that we can never correlate your identity with your traffic as we don’t even see your traffic in the first place!
It sounds like they're using some kind of onion routing.
They also say they'll be open sourcing the client which should tell all about the privacy claims.
We’ll be open-sourcing all of our client code so you can look at the source code and verify that we’re doing what we say.
My understanding is it's CONNECT-IP / MASQUE where the encrypted & HTTP encapsulated IP request is sent to Obscura and the details of the request are forwarded to what they're calling a "Blind Relay" which only knows Obsucra's IP.
2-hop onion routing with pre-defined routes. No Tor consensus. Very simple.
reply
Obscura by name, obscura by nature 😄
reply
Should be interesting…
reply