Some of the recommended steps like removing machine-id to prevent fingerprinting are especially funny when the rest of the article perfectly describes how to get your system in a completely uniquely fingerprintable state via obscure knobs most people don't touch.
As you've mentioned, it's a hardening "guide" without specifying a threat model, so its value is very limited anyway.
As you've mentioned, it's a hardening "guide" without specifying a threat model, so its value is very limited anyway.