Thanks for running an I2P node! (Now add a CJDNS one :)
Note that I2P doesn't have the centralization issues of Tor. The I2P network is both distributed and dynamic, with no trusted parties.
A single honest peer is enough to defeat an Eclipse attack.
Using a VPN would encrypt your node p2p traffic without waiting for BIP 324.