> I still own a iPad 3 with the same, old, software stack from 2013. It still works, I can do things. I just don't expect todays developers to make a herculean effort so that I can run their apps on my old device.
The fact that "it still works" isn't the only consideration though - it's the security posture. There's plenty of remotely-exploitable flaws in that software stack from 2013.
It was true. This was mostly because Windows XP had several open ports by default, and before SP2 (released in 2004) did not have a firewall. So when a vulnerable service in the default install was found behind a default-open port it would spread and replicate extremely quickly: https://en.wikipedia.org/wiki/Blaster_(computer_worm)
It was true (well perhaps more like 10 minutes). You had to connect your machine straight to the internet (ie. through a dialup modem), not via a router.
Also, some ISP's blocked ports which protected you somewhat.
It was certainly quick enough that there was no way to get the updates installed before the machine would bluescreen (many of these exploiters didn't care much for the stability of your machine...)
What's a good site to read postmortems on hacks carried out against consumer banking apps using iOS versions with obsolete "security posture?" I haven't run across any such reports but can't say they don't exist.
Nowadays, most security features and upgrades are designed to protect the device against its owner.
The fact that "it still works" isn't the only consideration though - it's the security posture. There's plenty of remotely-exploitable flaws in that software stack from 2013.