Use only clients that are open source. Use the most widely used and supported open source client to ensure that many, many eyes are looking specifically at that part of the code. Use only official releases or build from the source yourself so as to ensure nothing slips in.
I totally agree with this, and it allays some of my concerns. The difficulty - and problem - is in implementing that advice in a fool-proof way.
It needs to be clear exactly which versions of "...the most widely used and supported open source clients..." have been vetted by the community. That's why one of my suggestions was to have one version that we all sick with for a while. The 'switcharoo' attack, where someone tinkers with the Armory website and sticks a bunk, nasty version, that looks pretty much the same as the old code, except for one critical change. The key pairs would actually come from a predetermined list which the attack would have a copy of. Even if this mistake was corrected within hours, there could be many people how downloaded the bad version and not even know. The attacker could even just make the swap for a few minutes and then pull the bad version themselves, knowing that addresses would be created well into the future by those few, corrupt downloads.
Edited to remove random strike through