Nice. Software developer, gamer, occasionally 3d printing, coffee lover.
The test is simply showing two fingerprints for your browser. One, the server fingerprint, is one that any tracker can see. The other, the client fingerprint, is what can be used if you have Javascript enabled.
Instead of inundating you with test results, this one is simple - check to see if your fingerprints change between browsing sessions. If they don’t change, that means you can be tracked. In which case you can mess with settings and try again.
One of the points of Libre Wolf is to make you unique, but each session should be unique.
You can find some additional setting tweaks here: https://librewolf.net/docs/settings/
The “letterboxing” feature is an additional uniqueness feature you could consider enabling.
I’m particular you could check your result in this experiment: https://fpresearch.httpjames.space/
Try it in both normal and in a private tab, then record those results, reopen Libre Wolf, and try again.
The ad serving companies (Google) don’t care about what happens after the click (yet). As far as I’m aware no “handshake” process exists that would allow an advertiser to communicate with the as server and validate a click (such a process could be abused).
Most likely the advertiser would be using some form of client side analytics, so the click wouldn’t show up in their statistics, meaning the advertiser would see a huge discrepancy between the clicks they saw in the campaign and the clicks the ad server reports.
The article that user links is referring to GrapheneOS (and other OSS software) as not being “free software” - and they (GNU) delves into it more here.
Basically, GNU is saying software shouldn’t claim to be free and open source if they contain non free binaries / other non-free blobs.
The nuances between FOSS and OSS can be confusing. GrapheneOS is not claiming to be FOSS.
Both should if your goal is to not have a reusable fingerprint (which for a privacy focus would be). Server should change more frequently since it has access to less information about the browser. Server based fingerprinting is fairly unreliable, client side uses Javascript to generate more bits of unique data.