All traffic over I2P is encrypted unless you use an outproxy (which isn't as common as a Tor exit node is), so no. Most, if not all I2P torrenting traffic never touches an outproxy, just like Tor hidden services (.onion sites and whatnot) never touch an exit node.
Hosting a Tor relay is fine even, as you are still just passing encrypted data around. It's running an exit node that can get you into some sketchy waters with your ISP/law enforcement.
Yeah in some cases, and in other cases it's still just volunteers with really good lawyers.
And even then, there's still no definitive link from the exit node back to the guard (entry) node/relay.
And, if you're actually trying to be anonymous from 3 letter agencies, you wouldn't be messing with the clearnet (and therefore exit nodes) through Tor to begin with. You'd probably be sticking to Tor hidden services.
If this was the first time the world heard of onion routing, then yes.
Now they can realize that you're probably just one step in the chain. And with i2p there's no way to know if they even reached the end of the chain (provided you host i2p for long enough).
I don’t since I live in a third world country. Can seed at 1Gbps with no warnings whatsoever, 20€ monthly
I read
I don't since I don't live in a third world country.
Give your country more credit if you have a 1Gbps connection and it doesn't enforce draconian idiotic laws. Just out of curiosity, can you name the country?
The thing about second/third world countries is that if they don't even care about what you download, they still care about what kind of resources you visit. So, you still have to use various tools for censorship circumvention, and conventional vpn services generally don't work. Thus people often use tor, i2p, etc, but not for downloading (although tor, for instance, often doesn't work without bridges in such countries). And to be honest, downloading via tor is a very bad idea, that's not how it should be used.