http://opentracker.fattydove.i2p/a
magnet:?xt=urn:btih:78459b77591107ce7e1e20fc1e7b584552bb9d3d&dn=plugins_azneti2phelper-win32_2.8.2.1.2.zip&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fopentracker.dg2.i2p%2Fa
magnet:?xt=urn:btih:abcd...7890
magnet:?xt=urn:btih:abcd...7890&net=I2P
This should eliminate a lot of accidental leaks.
‽ When I2P is disabled in settings, all torrents are promoted to public. If any of them is started by accident, it starts getting peer connections over plain old IP. Old time software herders like us almost expect this exact thing to happen, but it's not the best choice, people might want to disable I2P for a moment to change node settings and be very surprised, etc.
DHT is another suspect. Do its graphs show the total traffic, or public only? If those are totals, then about 2 KB/s or less is nothing to worry about. If I2P DHT traffic is unaccounted (I can't see any activity in I2P monitor)
Obviously, the case doesn't matter. It is simply copied from BiglyBT which constructs it that way because it's cute.
NOTE: mixed torrents and I2P only torrents are handled separately within BiglyBT to prevent the correlation of mixed activity and pure I2P activity. If you add a torrent and subsequently amend its network availability (e.g. change it from pure I2P to mixed) then this will potentially reduce your privacy.