Very nice! I was thinking about the same project for Tor. Unfortunately I'm too busy so I hope somebody else will do the job for me :-)).
And unlike I2P, Tor is just a proxy service, primary made for HTTP proxying.
This is incorrect, Tor is acting as a
SOCKS5 proxy and is relaying any TCP traffic, not only HTTP.
1.2
Differences to TOR
The main characteristic in which I2P differs from TOR is the focus of the project.
While TOR was designed with the intention to enable anonymous internet brows-
ing, I2P’s focus is to provide an anonymous network, isolated inside the internet,
offering various protocols and applications within. It is however possible to utilize
I2P outproxies to reach the internet and thus enable anonymous web browsing.
Due to the focus of the project, there was only one public outproxy in place at
the time of this writing (false.i2p). Another difference to the TOR network
is, that I2P tunnels can only be used unidirectional compared to TOR’s bidi-
rectional tunnels. Also, as mentioned in Section 1.1 I2P uses garlic encryption
where TOR uses onion encryption. Both implementations are based on layered
encryption, garlic encryption offering the possibility to store multiple messages
inside the innermost layer [3].
http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf