Sort:  

Thank you. I think the I2P devs are well aware of this threat, but I will post a link to this article in the I2P forum. The I2P threat models are described in great detail here: https://geti2p.net/en/docs/how/threat-model
I had to write this article for myself to understand what it would take to de-anonymize an I2P user. At first it was all very confusing to me, but after I finally got my head wrapped around it I felt more confident about the security of the I2P network.

Good idea. If possible, could you please also provide a link to the complete white-paper?

Since you asked I was finally motivated to go over the whole paper again and fix the typos and such. :) This is no expert advice but it might help other newcomers as myself. https://steemit.com/security/@camb/how-to-trace-a-source-s-ip-in-anonymous-dht-networks-a-simple-essay

Excellent idea @camb. Keep up the good work!