<SNIP> For example, the Northern California Regional Intelligence Center has 29,114 accounts, and each one includes a full name; rank; police department or agency; email address; home address,; cellphone number; supervisor’s name, rank, and email address; the IP address used to create the account; and a password hash — a cryptographic representation of the user’s password (hashed with 1,000 iterations of PBKDF2 and a 24-byte salt, if you’re that kind of nerd). If a user’s password is weak, hackers with access to its hash could crack it to recover the original password, potentially leading to a giant list of all...