How and when will the industries using SHA-2 for securing sensitive data will feel compelled to change algorithm because of mining hardware manufacturing ?
The current generation of BFL ASICs may not be of any use for cracking password but future ASICs products will want to take advantage of it's ease or implementation, increasing profits and lessening risks. See : https://bitcointalk.org/index.php?topic=87476.msg968530#msg968530
Back in the days it used to be secure to use 9+ character passwords for securing a WiFi AP,,, now 12 is the norm.
I fear that eventually people willing to use a password they can remember will not be able to do so with anything sha2 secured.
- SHA-2 is the world most trusted secure algorithm.
- Some devices have sha1-2 embedded in hardware, as is the case in many routers / vpn.
(might be related) : Cryptanalysis of AES and SHA-2: how far we are from compromising worldwide encryption and hashing standards