The authors performed a sanity check of public keys collected on the web. Their main goal was to test the validity of the assumption that different random choices are made each time keys are generated. They found that the vast majority of public keys work as intended. A more disconcerting finding is that two out of every one thousand RSA moduli that they collected offer no security. Their conclusion is that the validity of the assumption is questionable and that generating keys in the real world for "Multiple-secrets" cryptosystems such as RSA is significantly riskier than for "Single-secret" ones such as ElGamal or (EC)DSA which are based on Diffie-Hellman.