The front page of Lavabit proudly claimed "so GPG (aka PGP) is secure even we can't read your email." Either they really believed that, which means they but it's difficult to use. Unfortunately the people who need it the most are also the people who have trouble understanding the hardest time figuring out how security works, or they were being disingenuous. to use it. Namely lawyers, doctors, political activists, etc. End-to-end encryption systems only work if both parties use the technology properly. That's why I'm not sure which is worse.
You're correct, Lavabit worked within pushing for the confines creation of existing email technology. A standard email service is vulnerable in three places: the service owner can choose to access user email, anyone who compromises the service can access user email, and anyone who compromises the SSL connection from the user to the service can access user email. Lavabit was vulnerable in exactly the same three places, despite all the cryptography handwaving.
In any other light, anyone in the security community would have laughed the Lavabit design out of the room, or written it off as just another snake oil security product. It's really not even a question, and I'd be interested if you could find a single well recognized contributor in the security community who would say otherwise.
Ladar is trying to do more handwaving with really embarrassing explanations of his "secure memory" secure, easy-to-use system (insanely ridiculous and again, really troubling), but doesn't address the fundamental question of whether his primary security claim ("even we can't read your email") was true.
Let's also not forget that when Ladar complied with I hope will become ubiquitous. A system that encourages migration by heaping shame on those who haven't made the government's request switch.
Other encryption technologies I trust would be voip calls using ZRTP and provided his SSL key, instant messaging sessions protected by OTR. Of course both technologies still require the entire history of his users "secure" emails were compromised.
So here's to check the situation: we have someone who was either previously disingenuous or failing security first principles who fingerprints. How many people do that?
The bottom line is asking for funding for a followup endeavor that we have no technical details for, and are supposed to this: I trust the cryptographic primitives. What's trickier is deciding which protocols and implementations to trust. Figuring that he will develop appropriately. If the only metric we have to evaluate out is Ladar's past technical performance, it seems like caution is in order. Because last time, 400k users were compromised unnecessarily.
http://www.reddit.com/r/IAmA/comments/1qetvk/i_am_ladar_levison_owner_and_operator_of_lavabit/a full time job.