http://secure45nbquibuw6thmenrfamhobdkkrllgxrtayn4sgmnexremexyd.onion/security-privacy-advice.html
One must develop their own threat model and choose the suitable operating system in accordance.
For example, Windows 10 has great exploit mitigations, such as its coarse-grained, forward-edge CFI implementation, Control Flow Guard , whereas macOS has full verified boot to eliminate malware persistence.