Y'all are getting deep into tinfoil-wearing-hat-conspiracy-theory territory.

If you are worried about the NSA compromising your hardware or software, then use multisig transactions and
sign on diverse hardware/software stacks. Generate the multiple private keys on different hardware/software
stacks, too.

Or, in other words, eliminate the single point of failure and you will mitigate whole families of possible attacks,
from "NSA compromised the hardware random number generator in my CPU" to "NSA is listening to EMF
radiation coming from my dedicated server in my data center" to the much more likely "data center employee
is tricked into letting somebody have access to my dedicated server."

--
--
Gavin Andresen