i was looking at i2p stuff from a few hero members, heres what one smart guy had to say
1.2
Differences to TOR
The main characteristic in which I2P differs from TOR is the focus of the project.
While TOR was designed with the intention to enable anonymous internet brows-
ing, I2Ps focus is to provide an anonymous network, isolated inside the internet,
offering various protocols and applications within. It is however possible to utilize
I2P outproxies to reach the internet and thus enable anonymous web browsing.
Another difference to the TOR network is, that I2P tunnels can only be used unidirectional compared to TORs bidi-
rectional tunnels. Also, as mentioned in Section 1.1 I2P uses garlic encryption
where TOR uses onion encryption. Both implementations are based on layered
encryption, garlic encryption offering the possibility to store multiple messages
inside the innermost layer [3].
http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf -
must read