Really appreciate you posting some specifics here. There's been a lot of hand-waving and big-brothering in the thread so far (justifiably so, security is a hot-button/serious topic) but you actually posted something concrete that helped me put a name-to-a-face as far as a pw hashing technique goes.
"“Amazon has begun improperly using Apple’s App Store mark in connection with Amazon’s mobile software developer program,” Apple also said “We’ve asked Amazon not to copy the App Store name because it will confuse and mislead customers,” said Kristin Huguet, a spokeswoman for Apple.
If A = B and B = C, then A = C, except where void or prohibited by law. -- Roy Santoro