At that point, does it really matter? You've already lost. Protecting against that was never your job, either. It rested on the shoulders of the site you were signed up at.
Yes, because password databases (assuming that the administrator is not completely incompetent) are obfuscated using a one-way cryptographic function. "pikachu" will fall in seconds to a dictionary attack or a bit longer to alphabetic brute force (7 characters). A randomly generated password like "VxfrFAH0pPqU4t" cannot be discovered via dictionary attacks and is unlikely to be brute-forced.
Now of course if you don't care, you don't care. But the use of a password safe is much less of a security risk than trusting a site with a weak password. All of the software I'm familiar with uses stronger functions that make them more difficult to crack than those used by most web sites. And since LastPass takes seconds to install and demands less time to login than trying to remember exactly which password I used for a service, there are few usability issues.
no subject
Yes, because password databases (assuming that the administrator is not completely incompetent) are obfuscated using a one-way cryptographic function. "pikachu" will fall in seconds to a dictionary attack or a bit longer to alphabetic brute force (7 characters). A randomly generated password like "VxfrFAH0pPqU4t" cannot be discovered via dictionary attacks and is unlikely to be brute-forced.
Now of course if you don't care, you don't care. But the use of a password safe is much less of a security risk than trusting a site with a weak password. All of the software I'm familiar with uses stronger functions that make them more difficult to crack than those used by most web sites. And since LastPass takes seconds to install and demands less time to login than trying to remember exactly which password I used for a service, there are few usability issues.