If there are no logs, there is nothing to give up. There is no law that they have to keep logs as far as I know.
You have to trust that the VPN provider doesn't store logs. I2P is pretty much trustless besides where the binary comes from, but you can even compile it yourself.
Being a node isn't an issue. The traffic is encrypted, the destinations are unknown to the nodes themselves, and the traffic does not leave the overlay network (I2P). In TOR, you also have something similar, but the traffic can exit the overlay network but to do so, your node must be an exit node. I2P nodes are internal by default and it's not that easy to make it an exit node.
You are very safe being a node in I2P.
Anti Commercial-AI license