You’re allowing the most cutting edge fingerprinting code to run in your browser. So depending on how badly you need to access the site and how you complete that CAPTCHA you decide.
But Tor browser have same fingerprint for all users
Fingerprint means many things. I’m talking user behavior like keystrokes and how you complete the CAPTCHA can potentially be linked back to you.
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html A good article
You can avoid Mouse wheel fingerprinting - using a normal computer mouse with a mouse wheel instead of a trackpad
And it looks like you can’t avoid Mouse Speed fingerprinting, CPU Benchmark fingerprinting, getClientRects fingerprinting
I’ve spoken with the author of this blog post before. I came to the conclusion that in VMs this is not a problem since hardware emulation makes it uniform.
However other data such as biometrical information like how you use your mouse and keyboard is a harder problem that needs a specialized solution. Fortunately there is one in progress.