i2p is different to tor in a variety of ways. One is that your device integrates with the network, so it is not secret from your device what your device is accessing at the moment. This is in contrast to tor whom have an official set of really-trustworthy-entry-nodes cooked in, so the device you are using changing is incidental since one hopes tor's trustworthy nodes are really super trustworthy.
@screwlisp I just wish #i2p wasn’t created in #java . Look into #gnunet also , lots going on there.