This is not a well-researched statement. There is no reduction in security of ECDSA by using the same key on multiple signatures. If there was, then no one would use ECDSA, as most other applications for it cannot accommodate new keys for every exchange.
[...]
It is an insult to cryptographers/mathematicians to, in any way, compare WEP to elliptic curve cryptography.
I fully agree with you that ECDSA is mathematically sound. And comparing it to WEP was an insult.
But I will disagree with you from the standpoint of implementation engineering. In my career I was involved in several fracas where a mathematically sound idea got corrupted by the cargo-cult style of its implementation in software or hardware. Side-channels are hard to detect, and the way the current Satoshi bitcoin client development is progressing, I will probably be willing to bet a small sum on an interesting crypto-snafu that's going to happen in some of its branches.
The above isn't a mathematical theorem, it is my hunch based on past experience with implementations of patented cryptographic methods. I have signed at least two NDAs related to the above, as of now I don't remember if they had already expired.
I've had this exact same debate on these forums already. 2112 is right about the keys.
We are, ahem, sure that ECDSA has no weaknesses against private key reuse. But it is
also a bad idea to reuse private keys, just because. It is just a tiny little bit bad of an idea. It is incredibly unlikely to ever be a problem. But throughout history, cryptographic system breaches in the real world have always been facilitated by key reuse.
People should be free to do whatever they want, but they should understand that reusing keys results in a slight decrease in overall security. The decrease might be infinitesimal, and it probably is, but it is still a decrease.