Fingerprinting is one of the most annoying things to fight, so my advice would always be to have a clear threat model first and then pick your battles wisely. There are easier and more effective ways to increase privacy (e.g. by simply using GrapheneOS with default settings I get like 80% of my threat model satisfied).
If you are in situations where fingerprinting is an absolute no go, the Tor browser will probably help you the best. This comes with security disadvantages like with all Firefox based browsers on Android, so for most people I wouldn't recommend it as a default.
The Brave browser is often mentioned to resist fingerprinting best among Chromium based browsers in Benchmarks. But that can be highly deceiving, as websites in general will be able to fingerprint you anyway if they really wanted, especially if you are logged in somewhere or change any setting.
So my approach would be first to be really aware of what you need and choose your browser accordingly. You might end up using Tor, Brave and Vanadium in different contexts, but don't fall for the best practice fallacy in which you think fingerprinting = bad, therefore Brave = universal solution.
A good read if you want to take 10-20m is this: https://opsec101.org/