Nothing will be truly anonymous until there is an IP solution (not I2P, which is offers only illusory protection) and open source hardware. Bloat is an issue, no matter how much you try to divert attention away. It exposes your coin to centralization and makes it easier to attack the network.
There is no indication that I2P offers "illusory" protection. There are theoretical attacks that remain to be proven, and there are demonstrable attacks
that are quickly patched. It is not perfect, but again, it is an added layer of obfuscation that will make it exceedingly hard for an advanced and resourceful attacker to even determine whether you are running Monero or not.
Well, there is this timing analysis attack for example and instead of labeling it theoretical, you could perhaps forward the previously asked question to the i2p team that is supposed to work on the i2p monero integration: is it possible to add some sort of random delay or something that would make this attack not possible?