I wonder if this implies a possible insight into password thefts, and why some of the "leaks" take years to actually be distributed/published by the original hacker.<p>If you stole a database of hashed passwords, you could focus on 2-3 "VIP" clients/celebrities of that database,
and despite the computational cost, try and crack that hash.<p>Knowning that if/when you crack the hash, you could potentially use that password on other logins that VIP might use, prior to anyone knowing.