The Theseus DHT protocol lets you create distributed hash tables (DHTs) with unusually strong security properties. Can I2P learn anything from this, especially for filesharing applications?