Slack Resets Passwords For 1% of Its Users Because of 2015 Hack

Any idea why passwords are still sent unhashed to the server in this day and age?

Why not get a nonce and a salt from the server, hash the password and the nonce with the salt, then send the result back to the server. It then applies the nonce to its own hashed value and then it compares the results.

Or something like that, which prevents original password interception.