This looks bad. Does this guy know what he is talking about? ... i think a lot of things have been sorted out already.
His main issues were concerns with scalability, some privasy issues regarding tracking ACK (acknowledgement) messages, etc, which Atheros himself claimed he's not even sure about (quote, "There is no clear defined line as I'm not even sure what the bottleneck will be (bandwidth? Disk IO? CPU? Memory?"). But overall he seemed to really like it as the first step to get things going. The TL;DR of his review was "Very neat system, that is very obviously in the very first stages of being developed, and it's great to see so many people giving serious critiques on it, and seriously working on trying to improve it.". Which is true.
I see no reason why BitMessage insists on addresses being a hash of the public key rather than the actual public key. It isn't like anyone can remember or will manually type in the address. This would allow you to get rid of the entire discovery step.
The ACK can be delayed by several hours and thus no one would know who sent the ack...
You need link-level encryption, plus modify the broadcast algorithm to randomly pick only one of your peers to broadcast to first. Your peer would randomly pick one other peer to broadcast to... if after X amount of time you have not received an inv from all of your other peers you pick another random peer from the subset that haven't acked and broadcast to them... everyone else is doing the same thing.
Then increase the connections-per-node to 32.
The result of this kind of broadcast is that a node that is 'connected to everyone' would only have a 1 in 32 chance of detecting the first broadcast, a 2 in 64 chance of detecting one hop removed, a 4 in 128 chance of first receiving the message after 3 hops..... At this point it becomes clear that being the 'first to broadcast' something as seen from a peer connected to everyone becomes meaningless... and link-level encryption prevents outside observers from watching the propagation of the message.
The only remaining attack is to man-in-the-middle the ECDH exchange used to establish the link-layer encryption...