No, you use one as the backup. That's why I said use JShelter, but if a site breaks beyond use, switch IPs and then reload with NoScript instead to be more selective of what is blocked and what's not. That way I can still block Cloudflare and Google and Apple and still let the actual site load. And JScreep seems (for me, YMMV) to treat each as distinct fingerprints.
IMO if you know you can have multiple fingerprint profiles anyway based on which combo of extensions you use that do roughly the same job, that's a net benefit.
Since January Google has been using browser fingerprinting and IP triangulation to track across incognito windows.
Meta wants in the game as well. Nothing done on a phone with Meta apps is done in isolation.
Edit: seems like only vanilla mobile browsers affected. Brave was not vulnerable, DDG minimally so, and I expect Iron/Waterfox with uBlock would also not have allowed tracking.
https://securityonline.info/androids-secret-tracking-meta-yandex-abused-localhost-for-user-data/