KCne
OP is attempting to rely on badness enumeration to block trackers. Badness enumeration may not be the only step people take to try to project against tracking, but it can be a distraction and even a hindrance for that goal.
Because OP hasn't really articulated their goals properly, I don't exactly know what they're trying to achieve, so I can't really help them. Regarding the article though, I'm sure they have good intentions, but I do believe they've fallen into a trap that is all too easy to fall into. You take the existence of an exception to a rule to attempt to prove why the rule is wrong. It's the hasty generalisation fallacy.
Throughout the article it argues why various technologies that we have are faulty because they can be bypassed. I've talked about this fallacy at length on this and other privacy forums. A fence that can be "trivially" climbed over with a ladder is not a faulty fence. A window that can be broken is not a faulty window. A public toilet door, with the shitty locks that they have, are not inherently faulty just because it would be trivial to bypass them. Blinds are not pointless just because you happen to leave them open all day.
Nothing has perfect privacy or perfect security, and despite what the referenced article "The Six Dumbest Ideas in Computer Security" says, security engineers are not aiming for perfection, those that do will inevitably create insecure systems. The ability to adapt is a far more realistic, humble, and achievable goal. This applies to privacy just as much as it does to security.
The part that I am not a fan of, is how it will mislead people into thinking that they should not be using these tools (privacy extensions, DNS filters, anti virus, VPN, etc). Therein lies the FUD. It doesn't matter how "soberly" or rationally it is able to articulate why these tools have vulnerabilities if people come away thinking they don't do anything for them, when that is absolutely untrue.
The only part I agreed with was about isolation / compartmentalisation, which is something Android and QubesOS provides and I wholeheartedly agree with. The proper philosophy is to assume it's malicious. The part about Default Permit is odd, pretty much every firewall these days uses default deny, maybe default permit was more popular 20 years ago? I don't know.