i2p is different to tor in a variety of ways. One is that your device integrates with the network, so it is not secret from your device what your device is accessing at the moment. This is in contrast to tor whom have an official set of really-trustworthy-entry-nodes cooked in, so the device you are using changing is incidental since one hopes tor's trustworthy nodes are really super trustworthy.