None of those points really apply to I2P. -Non persistant tunnels as opposed to persistent TOR circuits -The inproxy/outproxy model at minimum doubles the amount of "nodes" that would need to be captured for "unmasking" even then it is packet switched. -IRC routed through I2P is absolutely not like a TOR proxy.