Maybe apple themselves can convince you? Obviously you're not at all a pro in the tech industry, but here's a (as best j can simplify it) breakdown of ios 6.1.3 updates and overhauls- IT'S ALL ABOUT SYSTEM VULNERABILITIES-
I do appreciate your dedication to apple- but let's look at 6.1.3- and I will try to simplify some huge concepts apple has been vague on releasing details, there are 4 major system updates that are occurring- all are considered security based updates-
1) dyld: this was a vulnerability in the Mach-0 executable files, making any accessible device (so if you we're in range of a jailbroken and infected ios system or malware ridden Mac) vulnerable to Mach-0 files overlapping segment causing devices to not execute fundamental Mach-0 files any longer and allowing aggregation of these files. Mach-0 are one of the first op system boots after kernels and daemons, they run virtual memory, string program architecture together to make an op sys, delegate the CPU and library fundamentals, and MOST MALWARE REACTIVE- they define ACLs or permission settings on the hierarchy of a filing system (the first thing malware attacks).
2) kernel: this also is a local range issue- any contact can instantly make system vulnerable. It causes something called an information disclosure in the ARM prefetch abort handler. This is also complex as a process- it works with java scripting and http/HTML in ios, this is a security system that is bypassed so that illegal data can be fast tracked to kernel functions (most basic and essential codes- constantly running in system backgrounds, graphical interface makes up less then 20% of an op sys). Once this system is broken down, it allows illegal data to move constantly through a device, stops system resets from being successful, and interjects illegal processes using talagents - transparent coding moving at base functions behind the system at the most basic boot levels, making removal extremely challenging.
3) lockdown: vulnerably accessible devices are susceptible to core file permission settings on symlink core files, system files and creating a new daemon (2nd code booted on a system) called lockdownd infecting cloud, backup and recovery systems.
4) USB: a vulnerable device is susceptible to its kernel coding being executed arbitrarily resulting in a IOUSBFamilyDriver Device Pipe being created with their device as a user space. This is ultimately makes the device accessible globally at all times to the members of that device family, pipes data through the device, creates an interface allowing info to be removed and the system config to be constantly altered on the device, and for the device to run an input output loop of info (like spreading the infectious processes) at all times.
SOOOO.... If this wasn't infected malware systems- why the heck would apple drop such a HUGE COMPLEX SECURITY UPDATE for non-jailbroken phones (jailbroken phones can't take system updates) if there weren't massive vulnerabilities. I realize this **** is way over your head, it's complex IT. But apple doesn't update security till they have to. They sure as heck didn't explain this update to the mass public. Unless you write advanced code and have a solid background in systems- this isn't easy to grasp or swallow. Guess that's why some of us are buy ios devices- and some of us are professionals.