GrapheneOS It doesn't provide any significant kernel hardening. Sysctl configuration can barely do any hardening at all. Enabling hardening requires building the kernel with a different configuration to enable the upstream hardening features such as CFI and adding patches for stuff that's not upstream.
If not mistaken, Kicksecure does compile the kernel with custom config parameters, hence doing hardening beyond syctl. They seem to provide a variant hardened-vm-kernel, which ad-hoc compiles the kernel on local machine for unique kernel pointers, and reduces hardware options to a minimum for faster compile time and better security.
GrapheneOS Firefox is a very bad choice as a starting point but particularly if it's not going to be improved at all.
Maybe that is due to Kicksecure's interdependence with Whonix incl. Tor Browser, which prioritizes anonymity/privacy over security. Tor browser has its own place in terms of anonymity and can't be easily substituted by Chromium-based browser - browser fingerprinting is such a difficult topic on its own. Chrome is a terrible privacy choice, Chromium still has quite a few Google dependencies - iirc that is why Ungoogled Chromium exists. I think to have encountered rare tracking connections (Google) even with Vanadium in the past, but that might have been solved by recent versions. It would be interesting to know, how secureblue's Chromium browser behaves with in this regard. But yes, you're are right, Chromium is the better choice from pure security perspective.
GrapheneOS Debian's poor security largely comes from the very poor updates and immense amount of trusted packagers. It's a complete disaster in terms of getting privacy/security patches and supply chain security. There are an extremely large number of people who are highly trusted. Many of those people have extremely untrustworthy behavior and actively do things which are very problematic with their power.
Interesting point, actually never heard of this perspective . But doesn't Flatpak, which is advocated by secureblue as primary installation method, have a similar issue, with need to trust many individual developers? Debian at least is one responsible organization unit.
ryrona SecureBlue is 1) implementing an app sandbox, Flatpak
But so can Kicksecure, it's even installed as default? Flatpak internally uses bubblewrap sandbox, so to harden Debian repo packages for Debian/Kicksecure I am wondering, if it makes better sense to directly use bubblewrap - or other sandboxes like systemd hardening options, firejail which all make use of linux namespaces, seccomp, capabilities or cgroups to more or less extend. Advantage of secureblue is, it comes with secure defaults, which makes it very convenient to use.
ryrona web browser by default that has invasive telemetry enabled and questionable security settings, Firefox
I wish they would use Librewolf as substitute for Firefox, to make up for Firefox telemetry and ad connections. As stated above, it depends on chromium build at hand, how privacy-friendly this browser behaves. I gladly would take Chromium with ad blockers like U-Block Origin for security and privacy, but Google actively works against all blockers (Addon policy etc.).
ryrona KickSecure has not expressed any interest in implementing any app sandbox, which seems extremely negligent to security and privacy.
At least there seem to be incentives to work on it? https://www.kicksecure.com/wiki/Sandbox-app-launcher