I like the summary contained in the "Why use LEDE" section. It might be further improved by hyperlinking more of the statements to anchors within the "why_use_lede_full_list" document. It was not immediately apparent to me that there was more to read about security, for example.
The security section in particular should be more strongly backed by the "why_use_lede_full_list" document. I do not think the statement "thanks to its Linux OS which is unaffected by many common attacks" has much merit. The security community continuously finds many vulnerabilities both in the Linux kernel and its user-space software. I would like to see more details. How does LEDE mitigate zero-day vulnerabilities both in the kernel and user space? Does LEDE favor type-safe languages? Is ASLR is on? Stack canaries? Does LEDE prefer software packages whose designs include careful security considerations (e.g., qmail/postifx vs. sendmail)? What does LEDE do better than other Linux firmwares or other firmwares in general? What does LEDE do to encourage the proper configuration of the software it provides, to include strong authentication and encryption?
"LEDE is actively updated" could link to a description of how users can ensure their LEDE installs stay up-to-date.