NAT, for example. There is NATv6, but few implement it. Why? No idea.
Exactly, there is NAT66 and it's rarely used - because it breaks things and adds unnecessary complexity/cost.
It's useful in that it removes dependence on an upstream IP address - when your prefix changes, all hell breaks loose. Sure we can blame poor software or hardware for this problem, but it happens. Renumbering an IP network has never been a fun process, and things don't always work. After all, I know every time my ISP gives me a new IP address because connectivity breaks - the router sees a new IP address, but the cable modem refuses to accept it, forcing me to power cycle it.
Poor software is exactly it. For a typical end user network the prefix changes, your machine gets a new autoconfig address, and anything local (if anything) that you access is still accessible via the same mdns hostname. More demanding users can get a static block, or use ULA/LL address space for local use.
Look at the public stats, millions of people are successfully using IPv6 all around the world.
I'm sure the music and movie industry are strongly pushing for it - because one of the big reasons the lawsuits ended on copyright was because a judge ruled you cannot identify a person from an IP address.Which is true from a IPv4 perspective.
There is legislation for that in several countries already, someone is responsible for the NAT gateway and if they're not keeping adequate logs to be able to pin arbitrary traffic to a specific user then the operator of the gateway is held responsible. Several people went to jail in france over this a couple of years back. It makes it very expensive to operate a NAT gateway because you have to log pretty much everything, and this level of logging is extremely bad for privacy too. If you've already sunk the cost of acquiring and retaining all those logs, you might as well try to recoup some of the costs by data mining it.
IPv6 has only one thing going for it - end to end connectivity. And that was broken decades ago because we have firewalls and other fun things designed to break connectivity because it's just not safe to have true end to end connectivity anymore.
If you want to live in a dystopian world where you're only a client, and you're beholden to a small handful of corporations... Welcome to the curated networks of AOL and Compuserve.
Today end to end connectivity is safer than ever, because client operating systems have moved on from the "every listening service enabled by default" of the past. Client devices simply don't have listening services exposed by default.
And you know what's much worse than putting your machine on a connection where inbound traffic is unrestricted? Putting it on a public wifi network where not only is there no restriction whatsoever on what traffic the owner of the network or other users can send to you, but you also have no control over what the owner of the network does to your traffic. He can mitm, attempt ssl interception etc.
And yet people connect to public wifi networks all the time and the world hasn't ended, because current devices don't sit there with 50 unused services listening waiting to be exploited.
How many security breaches of end users occur due to inbound connections to listening services these days? Very few if any, only very niche situations. Virtually all happen via something which the user made an outbound connection to.
Plus by being unable to have inbound connectivity, you now have to rely on third parties for everything. You can't access your devices at home (CCTV, NAS etc) when you're outside unless you have a third party to relay the traffic. Can you trust these third parties? How long will they provide the service? How do you know they wont change the terms? People complain about this kind of enshittification all the time, and a lot of it is driven by widespread NAT preventing self hosting.