For sites you trust and that use uncommon CDNs you could easily allow all 3rd-party scripts by adding local noop rule. It's still as easy as using the Extensioner, and you get benefit of not adding additional attack surface by keeping extension count as minimum.
On a browser with javascript enabled you expose too much information you can be tracked on. On top of that, selectively spoofing some parameters makes you more unique paradoxically. You're the one has to prove that such extensions really work for effectively reducing online tracking and fingerprinting.
Policy control in the setting I provided blocks more dynamic third-party than uBO. Medium mode of uMatrix is good, uBlock is half baked because it only blocks frames and scripts.
You can't use uBO in an on demand mode. You are using it in a block by default, allow by exception mode, that is something different, because it requires constant fiddling.
There are many data points one can acquire with javascript, plugins and API's. So there are even more fingerprinting opportunities than you mentioned.
Fact is that no website uses them all, simply because it takes to much response time which chases away users (no one likes to wait). As an example youporn only looks at IP while xhamster (from the same network) looks at languages implemented in browser.
So I am not guaranteeing your untrackable, what I can promise is that the options I provided beat most of the fingerprinting mechanisms used in practise.
I am not going to respond to your No You kindergarten like response on proof.
PS ubo can be used in combo with this setup using Windows_Security thread on ubo in easy medium mode
Why a seperate thread? I got a few questions of the uB0 settings I posted in Old School's uB0 tips and tricks. In stead of stealing that thread I thought it might be better to create a new thread to explain these settings. I also got a question how to apply this on other browsers, so I left out...
malwaretips.com