Something to note here is that one should not forget that there are 2 main ways to defend against fingerprinting
The first one is to make everyone look the same so you blend together, this is what Tor browser and to a lesser extend Mullvad browser does.
The other method is randomizing your browsers fingerprint so you look like someone else every time. This way you don’t blend in with anyone, even your past self, which is the point, it (attempts) disconnect you from your past browsing sessions. This is what Brave does.
Both methods have their own set of pros and cons.
As @Valynor mentioned you shouldnt rely on those sites to tell you whether you are fingerprintable or not. The first issue is that they completely ignores the second model, which will always show you as unique (which is the point).
The second one is that those sites are often biased to privacy enthusiasts, as those folks are most likely to visit those sites, all while using special browsers setups, which can make private browsers look more common then they actually are.
These sites can be used to take a look at what your browser looks like, like you are looking in a mirror before you go out. It can be a nice educational resource to learn about what kind of ways you can be fingerprinted, but keep in mind that they are far from complete, and take the unique/ not unique part of those sites with a big grain of salt.