Thanks for doing this doctorevil. It's a good thing (despite your nick

) we know about this so early.
As I understand it, the design philosophy has been to keep the protocol clean, and place protections in the clients instead. Hence e.g. the lack of address checksums, 2FA support in the protocol. Trouble is the protocol came first with a basic, unprotected reference client. People then bought into a beta, some accepted the associated risks with that and did their homework first, some didn't. And it takes time after that for more advanced clients to be developed. The client devs have been working on ways to strengthen passwords, e.g. key stretching, wallet-like key file.
I started a wiki page on how to generate strong passwords, but it seems to have not received much attention. Would appreciate it if folks pointed more people to it, since I don't have time to trawl so many forums. And would also appreciate edits and comments in the discussion page.