Investigative overview of targeted architecture and algorithms

Summary
A technical report containing the final structure of the privacy operation modes describing how every algorithm will operate over these modes and the details about the SW architecture and design patterns that will facilitate future extensions of the SW library.