That seems a fairly glaring oversight given their stated goal.
Yes, it does.
I noticed, in a thread from 2012, someone calling out current Scryot implementations as light/fake/tuned down. Botnet safe, as it were. Is this still the general feeling on it? Is this the variant used in LTC? And is there a significant problem with running the full version of the algorithm? Honestly, I would prefer my CPU mining to occur mostly unnoticed in the background.