Good info here. You will have to read the author's article to answer your questions, I marked as 'source' above. I did read on a more recent article that I2P can be a little slower than a VPN because, I guess it is decentralized, all those node paths the info has to travel?? Believe me, if something happens to the company that hosts my "lifetime" VPN purchase, I will most likely switch to I2P.
I remember reading about I2P back in the day. I am old school. If my old memory serves me correctly, I think there are some vulnerabilities with using I2P instead of say a VPN? (Now, I am going to have to go down that rabbit hole again to refresh my memory.)
Edit to add;
The list below describes some of I2P’s main disadvantages.
Complex configuration process: It necessitates a drawn-out installation procedure and specific browser settings.
Must-have logging: The I2P user interface must be logged in for users to access their material.
Severe vulnerabilities: Over 30,000 users were made vulnerable by a zero-day vulnerability that I2P experienced in 2014. Later, a 2017 study found that several more I2P flaws may also be exploited.
A much tiner user base than TOR: As a result, I2P has fewer network nodes and servers and is more open to intrusions.
Less anonymity when browsing indexed sites: I2P does not ensure that users' browsing of indexed sites is completely anonymous. The use of VPN services may be able to address this issue.
I get the convenience, I really do, and works on every linux distro which is a plus, but I usually stay clear of them because of the bloat. Maybe that is a misconception on my part. I should preference that with the fact I use Arch (btw)...so AUR usually has everything I need.
Or usually the ones behind the problems = FBI & CIA.