In some ways Loki you are correct, but you have made some very dangerous and illogical conclusions in saying so. Silk Road will not be hosted on i2p for the foreseeable future for a number of reasons and we have already (in private) placed Silk Road on i2p for testing reasons before removing it. The issue with i2p right now is that it has no thorough research into it. Only two years ago Tor hidden services were believed to be very secure but once funding was thrown into proper research then a large number of attacks were uncovered - i2p has not had this attention and it is a poor step to assume because none have been publicly disclosed that none exist. i2p is more ideal than Tor for peer to peer applications since that is the foundation of the network whereas Tor was designed to serve content to clients. Identification that you are a part of the i2p network is significantly easier than identifying users of the Tor network due to the peer to peer nature of it, all i2p users are in essence relays and so their IP is publicly available to connect to. However such a system makes traffic analysis against a server significantly easier. i2p is designed to give users more protection than tor due to the relay to user ratio being significantly higher, but this comes at a cost of the traffic analysis risk. There is no chance any successful market such as Silk Road could run on i2p in it's current state and probably would be unable to do so without at least 40-50 other major services with an equal or larger sized userbase and in my view, at least x50-100 the current users. This is the primary reason behind our decision not to move onto i2p as it is far too small to host major services like ours. We must remember, user security is imperative and right now Tor and i2p both provide similar levels of security to the end user, but the main target of any law enforcement attack will be the server of the service and the operator since it is more resource efficient to catch a central larger source of information than to chase individual users over theoretical network attacks. Let us not forget right now to our knowledge Tor is still safe and I personally believe with small improvements we can further protect the network, all attacks to date have hit the coding of the services targeted, the operators of the service or delivered an exploit through the user interface; none of which are network based flaws but human ones. Silk Road is committed to protecting our network and we have actually already started to put relays online to help expand and improve Tor: https://atlas.torproject.org/#search/SilkRoad