I won't even go into their blatant breaches of contract...They toss a ToS at you, but you can only read it when signed into your manager and you can only sign into your manager if you accept the ToS. They won't email you the new ToS either, you have to accept it without being able to read it.
I hope Apple is taking notes.
"clearly?" OVH is wrong. Based on this information alone, it is not sufficient to say how costly it is to recover the password. SHA-512 needs to be iterated to make it costly to brute force.
For example, a raw SHA-512 hash, even salted, is not iterated and is easy to brute force. But multiple passes, as in crypt-SHA-512, are iterated and very costly to brute force.
Follow their advice: "we advise you to change the password for your user name."
If I used someone competent (i.e. they still have bugs but they use bcrypt), they'd have lost: $2a$10$NkYCXBjWeVP0rJUlfl0VL.d66EvJjbVUA/YEsmBSyTZOnbY0/anxa which is a bcrypt hash of my most secure password.
I'm happy to publish that. The salted SHA-512? Not so much!
I would hope "based on" doesn't mean that but why use the phrasing at all? Either it's SHA-512 or it isn't and if it isn't, confidence is definitely not instilled.
That translates to password reuse, or an insecure password.
An email will be sent today with the new password
Password in plain-text? I understand the convenience factor but doesn't sound very secure... https://www.ovh.co.uk/cgi-bin/nic/nicPassword.cgi
But yes, in general, email isn't a very secure method of sending passwords.