That is very interesting. I would imagine optimizing their algorithm for cloud computing could go a long way.
For instance, instead of checking back in and dividing the workload up linearly, make the processes almost mutually exclusive to eliminate the hit that the network provides and have them sync every once in a while to provide feedback for the user.
Granted that is vastly oversimplified, but I'd be interested in what they could do with that.
Additionally, I don't understand how PasswordPassword is easier to crack unless the algorithm specifically checks for word repeats. The same goes for P@55w0rd - unless it is in the dictionary that the hacker is using, the program would have to traverse the entire ASCII character set in the worst case scenario.
-GP