The blogpost claims a firefox tor privacy bug, but the technical details are missing. without code samples and repro steps, this is just clickbait.
Tor already uses a random, ephemeral identity. so what if an indexer could guess one? the real problem: how much extra data firefox leaks via indexeddb on tor circuits. #torproject
https://fingerprint.com/blog/firefox-tor-indexeddb-privacy-vulnerability/

We Found a Stable Firefox Identifier Linking All Your Private Tor Identities
We discovered a privacy vulnerability in Firefox Private Browsing and Tor Browser that allows websites to fingerprint and track users across origins using IndexedDB database ordering, even after closing all private windows.