I2P has like 5 thousand users. (Nearly) all I2P nodes route for other nodes. Adding a few high bandwidth nodes to the I2P network will allow you to enumerate almost the entire I2P network. I2P has users spread out through the entire world. I would hate to be a vendor who leaks rough geolocation via mail and uses I2P, it will probably be pretty easy for the feds to determine that the one person using I2P within five hundred miles of where the vendor shipped from is the vendor. Not to mention I hope you have zero down time if you use I2P. Since I2P Eepsites (hidden services) are also routers. All an attacker needs to do is see if there is a down time correlation between one of the I2P nodes and the hidden service to deanonymize the hidden service. I hope SR isn't running as a relay too actually, for the same reason (busts out Tor relay history and cross references it to SR down time periods....). I2P also sucks for various other reasons. Tor was a good choice, quite possibly the best.