Very nice! I was thinking about the same project for Tor. Unfortunately I'm too busy so I hope somebody else will do the job for me :-)).
And unlike I2P, Tor is just a proxy service, primary made for HTTP proxying.
This is incorrect, Tor is acting as a SOCKS5 proxy
and is relaying any TCP traffic, not only HTTP.
Diﬀerences to TOR
The main characteristic in which I2P diﬀers from TOR is the focus of the project.
While TOR was designed with the intention to enable anonymous internet brows-
ing, I2P’s focus is to provide an anonymous network, isolated inside the internet,
oﬀering various protocols and applications within. It is however possible to utilize
I2P outproxies to reach the internet and thus enable anonymous web browsing.
Due to the focus of the project, there was only one public outproxy in place at
the time of this writing (false.i2p). Another diﬀerence to the TOR network
is, that I2P tunnels can only be used unidirectional compared to TOR’s bidi-
rectional tunnels. Also, as mentioned in Section 1.1 I2P uses garlic encryption
where TOR uses onion encryption. Both implementations are based on layered
encryption, garlic encryption oﬀering the possibility to store multiple messages
inside the innermost layer .http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf