It is easy to build anti-fingerpriting solutions that work with popular fingerprinting demos.
It is impossible to build anti-fingerprinting solution against a sophisticaed fingerprinter like
GPU fingerprinting
https://arxiv.org/pdf/2201.09956.pdf
https://www.techpowerup.com/291518/researchers-exploit-gpu-fingerprinting-to-track-users-online
Audio fingerprinting:
https://www.cs.princeton.edu/~arvindn/publications/OpenWPM_1_million_site_tracking_measurement.pdf
https://techcrunch.com/2016/05/19/audio-fingerprinting-being-used-to-track-web-users-study-finds/
If a sophisticated fingerprinter is allowed to run, it will fingerprint the browser.
Therfore the best solution is to prevent fingerpritner from running. Any other approach is doomed to fail, and can only give sense false sense of protection, when tested with fingerprinting demos that use basic fingerprinting methods, that are easilly avodied.
There is no perfect solution and we simply avoid to play cat and mouse game played by other browsers, giving users false sense of protection. Our approach, blocking fingerprinters from running, is protecting probably agaisnt 99% of what is used out there.