The system JD uses is close to as good as it gets (assuming proper implementation). This is possible to the standardization of strong cryptographic protocols (and hash functions, such as SHA).
You're using some strong wording there. Do you have any source or quotes to underline this or are you just wildly speculating?