http://i2pforum.i2p/viewtopic.php?f=8&p=2447
For example, if a malicious user declares that he owns a certain i2p domain, such as evil.i2p. for #3. maybe I'm not describing it accurately. What I mean is to provide a way for users in the censored region to build i2p < = > tor services in that region.