Browser protection from the list of digital fingerprints

How does the browser protect these lists of fingerprint vectors? They are as follows

1. User Agent (User-Agent Header)
2. Screen resolution (screen.height, screen.width)
3. Window size (window.height, window.width)
4. Pixel density (screen.pixelDepth)
5. Depth of color (screen.colorDepth)
6. Time Zone ((new Date ()) GetTimezoneOffset ())
7. installed plugins
8. installed fonts
9. navigator.platform
10. Flash / Java version from JavaScript
11. webgl (graphics hardware and driver version)
12. canvas
13. Multimedia devices (navigator.mediaDevices.enumerateDevices ())
14. Language
15. Supported session storage
16. local storage supported
17. codecs
18. DRM
19. DNT enabled
20. indexDB supported

The entire list of vectors above may expose a security vulnerability and each user session may be manipulated or diverted remotely without being noticed by the user.

Is there any other software or plug-in / addon to meet the lists above.
Apart from the Tor browser, in case there is another normal browser, how should we prevent them?

Could someone briefly explain how he protects against
to the above list of fingerprint vectors? What are the measures or measures taken to overcome the above case? In case there is no software to install. What must be the necessary configurations to apply to make it totally secure?