I have never been very impressed by I2P, although it does seem to have the most vocal group of proponents. I personally see it as being similar to the Apple of anonymity networks it has a hardcore fan base of people who know it is the best, but they don't seem to quite know why it is the best. I guess I would compare Tor to Linux and Freenet to BSD.
LOL, that's a great description, and of course that means clearnet is Windows.
A lot of the eepsites are also hidden services, so you can access them over the safety of Tor. Irc2p has an onion address, and I've chatted with the I2P folks there. In general, I find them to be a friendly, enthusiastic group of people who are doing innovative things with that technology.
However, there's not a lot of hardcore criminal activity on the network (mostly bittorrent), so they have no serious adversaries like LE. As such, the security of the network is untested and they are in a honeymoon period. As soon someone decides to distribute massive amounts of CP or run a large drug market or terrorist forum on the network, their illusion of safety may come crashing down rather quickly.
Tor has already demonstrated its resistance to investigations and attacks by the FBI, Dutch police, and Anonymous hackers, among others.
Freenet is also estimated to have about 20K simultaneous users. There are two ways of looking at this though. Tor certainly has the most concurrent users, I think it actually serves over a million people per day now. On the other hand, Tor has the least routing nodes of the three major anonymity networks (Tor, I2P, Freenet). Tor has about 3,500 routing nodes, I2P and Freenet have about 20,000 routing nodes each. You get anonymity gains by having a bigger userbase as well as by having more routing nodes (in the case of I2P and Freenet clients and routing nodes have about a 1:1 ratio, for Tor the ratio has been about 400:1 .) If somebody can see Tor exit traffic, they know the traffic originated from one out of over a million possible Tor users (since more than a million people use Tor, just not at the same time).
I think that number is closer to 3 million, based on annual browser bundle downloads (36 million), and adjusting for re-downloads of monthly releases (divided by 12).
On the other hand, if they see content published to Freenet, or somebody accessing an Eepsite, that content/access came from one out of only about 20,000 users.
Yes, and they also (potentially) know all 20K IP addresses, whereas they know 0 Tor user IP addresses unless they run entry guards, and then they know some single digit percentage of IP addresses.
Looking at it another way, assuming all nodes route the same amount of traffic (which they certainly do not, but for the sake of argument. In reality we would need to compare bandwidth added). an attacker who adds 1,750 nodes to Tor can see roughly 50% of the traffic routed through Tor, an attacker who adds 1,750 nodes to I2P can only see 8.75% of traffic routed.
Adding 1750 nodes (or even a small number of nodes that add 50% more bandwdith) will be much more noticeable on Tor than on I2P, so in practice you may be worse off with I2P, since you would simply stop using Tor.
So from the start your anonymity with Tor is greater than your anonymity with I2P or Freenet, because you have a much larger set size to blend into. But from the specific perspective of an end point timing attack (by far the most worrying attack against Tor), you will be anonymous to the set size until you are deanonymized. This is really roughly speaking though because there are so many other things to take into consideration, but for the most part I think many users of Tor (especially the non-pseudonymous ones) will continue to be anonymous to the set size of users until they are deanonymized with a timing attack. Having a bigger set size to blend into at first is beneficial, but the risk of falling victim to a totally deanonymizing timing attack is also a lot higher because the number of routing nodes is a lot smaller (and therefor it is easier for an attacker to control a larger percentage of them).
It's not really comparable, because most I2P activity is internal to the network. So when discussing a correlation attack, it's only fair to compare "Tor use that only involves hidden services" to I2P, or to compare "I2P use that only involves outproxies" to Tor. On Tor you have 800 exit nodes, but as far as I know there are a scant few I2P outproxies. In fact, an attacker could easily run outproxies and control most of that activity.
A large percentage of the SR community only uses hidden services, specifically the market and this forum. So from that perspective, they are not susceptible to correlation attacks, their IP address is more difficult to enumerate (than on I2P), and they are part of a much larger anonymity set.
Setting aside attacks on the services, would you say SR users are safer on Tor or I2P?
Overall I definitely like Tor the most. It also has the enormous benefit of allowing traffic to exit the network. I2P is weak to an assortment of attacks that Tor is well protected from (although I2P is better protected against other attacks that Tor is not well protected from, for example internal timing attacks), Freenet is difficult to use for service providers, etc.
Yes, Tor's focus on allowing safe clearnet access is a huge benefit, and (I believe) the main reason it is the most popular anonymity network. However, another big weakness for I2P is that there is no safe web browser, leaving I2P users much more vulnerable at the application layer (regardless of network layer considerations).