1 Searching for hash(apple) in users' hash list...
2 Clever attackers will eventually find ways to compromise the keys, so it is important that hashes are still protected by salt and key stretching.
3 It's clearly best to use a standard and well-tested algorithm.