Yeah, these signatures aren't reusing R at all, or it would be pretty obvious.
Yeah. That's actually what I thought before investigating further. Any weak keys would've been swiped by the many bots that search for vulnerable keys by now. I believe there's actually quite a few of them just sitting around and monitoring the mempool.