When building cryptographic systems, you assume attackers have certain capabilities without needing to figure out all the ways they can attain those. "I set my PK to 0, group admin can read the history" is an attack. QED
to which I say: what capabilities does one typically assume then? what about "I set my PK to the group generator, server admin can read the history"?
No, because setting your public key to the generator doesn't result in an all-zero shared secret, and will therefore depend on the secret key of the other participant in the ECDH protocol.
Zero is literally the only failure mode you have to avoid.
well, on the public key of the other participant. >
