Yes, I have the password file and I've run it through oclHashcat too.
Whether someone manages to get your email login via brute force, dictionary or social hacking/phishing,
No, I'm saying that "brute forcing" in the thread refers to recalculating the hashed passwords in the password file. Unless your email password is the same as the one you used on Mt. Gox you are now talking about a completely different kind of attack. For which the chances of success are equal to whatever measures are in place by your email provider, how easily you fall for a social engineering/phishing attack and the strength of your password. Unless the password you have on your email right now is weak or the same as your Mt. Gox password. There is absolutely no advantage in changing it.
Having a strong and new email password is bad and a turrrrribull hassle(this is how it seems to be portrayed at the moment) how?
No, it's just that the only useful advice one can extract from your statements are:
i) Change your password if it was the same as your old Mt. Gox password. Advice that was given my Mt. Gox ages ago
ii) If your password for your email is weak. Change it. Advice that is probably older than you are