Thank you for the tacit admission that MS Windows 10 security has more holes than a sponge.
On the following Windows forum post 1904 people state that "I have the same question" to "Why is Windows 10 so bad?" and the Microsoft has locked the thread: https://answers.microsoft.com/en-us/windows/forum/windows_10-performance-winpc/why-is-windows-10-so-bad/10dedebe-6be7-41a1-ac98-86adfba68205
I wonder why? Could it be that MS Windows 10 sucks so hard that it blows?
In reply to your previous question, no, I do not work for Amazon, and I really do not like Apple, I have been in I tea for 27 years working in corporate IT as an ERP consultant so I have no skin in the game other than to be pissed off at how bad MS Windows 10 sucks.
I love working with people like you. I genuinely enjoy it.
The Hacker News, Dark Reading, International Association of Privacy Professionals, and ThreatPost rate Microsoft's current OS as top box. Microsoft is in Gartner's magic quadrant for security, outpacing Amazon and Google. Microsoft spends well north of US$1B on security. They are arguably the leader in security across all of IT.
Your entire argument is that because Microsoft patches their operating systems, they're natively insecure, and that speaks directly to your ignorance and outright disdain for the Windows OS. The fact that you're focused on Windows 10 tells me that you're not involved in security. Linux patches their kernels monthly for many of the same vulnerabilities, because the vulnerabilities are specific to a common protocol, not a specific OS. As an example, SMB was patched by Microsoft several times in the last year, but that patching also extended to Linux and Apple devices for the same reason.
You're also arguing from the perspective that more frequent patching is inconvenient and means something's natively wrong, so what you're really saying is that you're content with your operating system vendor just sitting on in-the-wild vulnerabilities so as to not inconvenience you. Thus, you'd prefer longer-term patching that could patch a much larger set of dependent subsystems, likely resulting in bigger problems and requiring extended troubleshooting in order to unravel a Gordian knot of stack faults, debug logs, and/or memory dumps. No thanks! I'll take the fail fast and recover methodology.
27 years working in the IT industry has tainted you. Your legacy mindset is clouding your understanding of the needs of modern security. I've worked with people in government like you. Wrenching your mainframe or Oracle or (shudder) Novell subsystems from your control is like trying to take a steak from a rottweiler. Sit in your corner and enjoy that steak. The rest of us take solace in the fact that our operating systems are natively secure from intrusion because we trust that our vendor is keeping the kernel up-to-date.