I’m sorry if I’m bursting anyone’s bubble by repeatedly pointing out that technologies like Tor or i2p or blockchain whatits aren’t as safe and secure as you’ve been led to believe. The truth is, you always need to have a threat model, and calibrate your expectations against it. If you want some piece of information to be inaccessible to, say, the US NSA, Tor or i2p will be inadequate. If that’s not your threat model then maybe they’re fine for you, though personally I don’t trust overlay networks like that because they’re black boxes to me. “Anyone can run a node” is terrifying to consider.