This is nowadays true for most Linux distros. E.g., Arch Linux[1]
>
This page describes security packaging guidelines for Arch Linux packages. For C/C++ projects the compiler and linker can apply security hardening options. Arch Linux applies PIE, FORTIFY_SOURCE, stack protector, nx and relro by default.
In debian[2]:
> Debian enables several hardening options by default (see dpkg-buildflags --dump for a list) but you can enable more by adding [...snip...] For example, this includes "PIE" and "BINDNOW", which should be used when building programs that handle untrusted data (parsers, network listeners, etc.), or run with elevated privileges (PAM, X, etc.)."
Though I admit there's a bit of a spread regarding PIE/hardening prevalence in their case, as these decisions are up to the maintainers. I'll add that I did some large scale analysis of hardening prevalence on Linux distros but I found way less diversity of hardening flags than one would expect (at least from the major ones).
Regarding this:
Well, at a conceptual level, yeah it should be possible to upgrade alpine to TUF (though I'm not an alpine dev). In practice that'd require somebody willing to steward such a development effort :)