Crap crap crap crap crap.
game over man, game over.
Good grief. VOIP / video conferencing leaking your secret keys !
Provided you use them 91 times to sign the same message, if I am reading this correctly.
If I understand the paper correctly, they are suggesting that ECDSA is often implemented so that if you supply the same key, the code will calculate the same nonce & you can track that calculation to leak the nonce & therefore the secret key used by the other party. So simply connecting with the same ECDSA parameters is sufficient?