One one hand, I somewhat like comparisons like that and occasionally ask myself similar questions. On the other hand, I find answering really challenging since I see security not as a 1-dimensional good-bad axis but having several dimensions, branching out into sub-levels.
What makes it even more challenging: What can be a show stopper for one person may be completely unimportant for another. For instance, a relatively weak (HW) physical security of a common desktop linux device might be accepted by s.o. who only fears malicious downloads and/or has their devices locked up in a high security bunker.
Anyway, if s.o. has more deeper insight and wants to provide their evaluation of some aspects of these OS, I'd definitely be interested.