How exactly does I2P discover and connect to peers? How do you know that the peers are in fact legitimate?
I'll have to look into that aspect some more.