Ok, so your take is basically the same as the commenter on Schneier's blog (
https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html#c1678526).
Basically he says what you are saying - that a recommended 'random' number generator for use with ECC has been proven to have backdoors, and that some families of ECC curves have weaknesses. However, because we're using secp256k1, a known curve with explainable/justifiable constants, the concern cited by Bruce is not applicable to Bitcoin in addition to the weak motivation for attacking it anyhow.
Thanks for the reply.