No, it's not deprecated. Safer is still used and remains a valid option.
No, it's not deprecated. Safer is still used and remains a valid option.
someone seeking to exploit vulnerabilities in Windows XP would be the primary target.
Just because something is outdated doesn't mean it's completely useless. There are still PLC-related topics available that work with XP.
Many people think a hack is focused on them personally, but the truth is automated tools scan millions of devices worldwide every second. They search for systems lacking security patches, probing without targeting anyone in particular. Every hour, devices that are reachable face attempts from bots trying to breach them. Outdated operating systems remain vulnerable, and antivirus solutions can't keep up because the underlying issues aren’t resolved.
Legacy programs still contain vulnerabilities that won't be fixed, even if updated later. They become safer only when they're so outdated that no current system can use them. Mac OS 9 remains unaffected by today's malware since it hasn't been updated for 23 years and lacks compatibility with modern operating systems. It might just act as a harmless host, spreading threats through file sharing. This doesn't guarantee safety, as it can't handle contemporary encryption methods. The strongest security it offers could be compromised in seconds by a modern device. Still, many applications remain functional on Windows XP, and several exploits persist against the most recent OS updates and installed software.
In 2017 a breach took advantage of an old Windows XP flaw, which was still present in many systems. Since half the world’s ATMs, government networks, and industrial equipment ran XP, the impact was massive. Microsoft had to release a security patch even though they had stopped supporting it years earlier. Attackers love targeting outdated systems, as seen in the WannaCry ransomware incident.
The system is secure as long as it uses BASIC 2.0 on a Commodore 64.
This example is flawed. The C64 isn’t handling a contemporary automotive environment. Are you aware of the internet requirements for all car manufacturer scanners and diagnostic software? Many of these tools also depend on online connections. Every modern establishment charges significant subscription costs to access the necessary servers, which link to car makers and suppliers. This trend won’t change with electric vehicles. Plus, features like multimedia and self-driving capabilities add complexity, along with online booking systems, sales platforms, invoicing, and payment processing. Have you experienced the modern world recently? When a vehicle arrives at the workshop, I receive a video on my phone showing the technician’s findings and recommendations. Demonstrate how a C64 could manage that safely. If such a shop relied on a C64 today, it wouldn’t be operating like a modern facility. It might resemble the 1980s setup where appointments are booked, data is entered manually, and a printed invoice is issued. That’s essentially its current function. Even for classic car work, you still require updated appointment scheduling, invoicing, payment handling, and information updates. That article from 2016 was outdated at the time—it was a unique piece, but it didn’t account for the C64’s limitations. When the C64 was released, most users didn’t have internet access anyway. And viruses were rampant back then, making it inherently risky. It wasn’t safe then, and it isn’t safe now.
The more important issue is identifying who continues to use Windows XP. Since there are still connected systems online running XP, attackers will attempt to take advantage of them. Even if you're not a target for hackers, their automated tools won't care. There might be valuable data hidden within these systems that could be used against others, or they could just serve as another bot. Ultimately, any vulnerable system will be at risk of being exploited.
A bit unrelated, but the focus is on big tech events. I’m trying to remember, but there was a recent report about a large technology gathering (possibly CES) being found still running Windows XP for its displays. More relevant: Those digital boards weren’t online. Outdated systems like XP face the same risks as newer versions, yet they lack updates and security fixes. It’s unclear if attackers are specifically aiming for XP, but it’s possible they’re not excluding older OSes from their threats. Still, using such systems is risky—keep them offline and shield them from malware crafted through exploits discovered long after the last patch.