Isn't it obvious that when everyone is a middle node by default and all tunnels are one-way and randomly changing every 10 minutes, it must be harder to perform deanonymizing attacks?
If you're a relay, then the dates and times you are online are public and may be correlated to the times a particular username logs into a particular hidden service, if that is also public. With Tor, I'd at least have to snoop your specific connection or your guard relay to know when you're online, but with I2P, it's public knowledge.
True. Although you can opt out of being a rely on I2P, or by adding more hops you will make such correlations less reliable (together with the reliability of your connection).
Also AFAIK only your destination eepsite can perform such an attack, which is not very scalable for an attacker.