Your argument just assumes there is no latent structure that can be exploited. That's a big assumption.