You haven't been reading carefully. There was never, ever, lost of coins because of Bitcoin-QT (bitcoind) RNG. You should not trust Android wallet or browser Javascript page to do generate you keys, but you can safely assume that reference implementation does it perfectly. There are comprehensive bias tests for Bitcoin-QT RNG results, and it always performed flawlessly in every one of them.
You misunderstand the scope of the issue. All the repeat r value attacks were not due to flaws in the wallets themselves but the fact that the entropy for the CSRNG
comes from the operating system, In the case of the android platform there was a flaw which resulted in repeat values under some circumstances. A valid wallet using flawed data from the OS is just as weak as a flawed wallet. Even saying "bitcoin core RNG" is misleading. There is no Bitcoin core RNG. Bitcoin core requests random bytes from OpenSSL. OpenSSL gets that from rand_lib.c and where rand_lib.c gets it from depends on a lot of variable like the build environment and the target operating system but ultimately it is provided by the OS. It would be impossible for OpenSSL to have a flaw
flaw that went undiscovered for years. Right?
In modern day crypto the RNG is the weak point and it is for the most part an opaque black box. If I was the NSA I would be putting the bulk of my crypto breaking budget into weakening the RNG. Strong Algorithm + Weak Numbers = Breakable Crypto. Hardware RNGs are not a magic bullet either. Here is a 'random' sequence of bytes.
13660f36ade6a8084c9a8f25a4e8d8a2bb3c2cb7f6f92ad225514d682ace46a6eb37f4ebf16999c15c43e0de53499a62b69259e8ea2dbf129a59452cf046e63b
b123588e2d26698190eb260e6fddf8d65a13120793fc03c2dc0b07b210f8c32ffe94091da210c8d7e439e32a0d2e1a6089fd4ee4a01bc71b64387036c232eaa8
e247b808959dd0db4ab6392e50cdbacd940e632af0f651815d981e079e03f922bb1bde6c0385f7cf76c26ff6f6688bf63427ae301a12d9bb75322f0e01e331b2
4e2ab2f5f2b18693405a7b111a81935786e0da4baad72c0ef30dea5eaf7026ec4ca15d295a959acfb2431960289bd0a02c35d8a5a5819f6fb3b36d9984f91b28
43399ba67ab67bf116391690c797c36838114f04a005b0d160130c2ba124213bf37033d0c8206b1aab24be34e13562579275bff41e2b4129da1bffcb4b953802
Was this generated random from a secret entropy source such that it couldn't be reproduced. If your processor's RNG produced that sequence would you trust it? The sequence is too short but even a much longer sequence (billions of bytes) would pass standard statistical tests for bias. The bad news is it is trivially reproduced but without insider knowledge almost impossible to prove it isn't 'random'. Want to know how I generated it?
next_64_not_so_random_bytes = HMAC-SHA512(count, key)
where key = "The NSA is happy to provide you weak numbers" and counter=1 for the initial request and increments on each additional request.
The NSA got caught putting malware into hard drive firmware. To pull that off required detailed insider knowledge and access to manufacturing private key to sign the false firmware. Do you think it is beyond possibility that they may attempt to introduce weaknesses into the hardware RNGs in one or more processors. How are you going to verify there isn't a weakness in silicon (at 20nm no less) of every processor you own and will ever own? Is your OS right now using the RDRAND instruction to fill its entropy pool? Did you even know that was a possibility? Starting to see why I said RNGs are black boxes. Validating it requires validating not just the application but the library, the OS, and possibly even the hardware platform itself.
Now generating all your keys individually by physical random event is probably overkill however the nice thing is that two technologies make that unnecessary. The first is RFC6979 which generates signatures without using a random k value and the second is HD wallet algorithms which can generate a lifetime of keypairs from a single high entropy seed.
So the question becomes can you PROVE your random numbers are strong (high entropy)? I can produce high entropy numbers from a dice, coins, or cards trivially and be guaranteed they can't be reproduced. Can you say the same about the black box random numbers provided by your OS?