This provides nothing but cosmetic benefits and actively hurts your privacy/security. It makes you more fingerprintable and adds another possible security risk.
I personally would forgo the extension and just use separate profiles. You can use Firefox’s built-in profile manager and Total Cookie Protection to achieve this same effect (although you’ll have to start a new session for every profile).
This extension is unnecessary. Use uBlock to block 3rd-party Facebook domains.
I’m unfamiliar with this extension, but from what I’ve seen, I would definitely avoid. Installing websites as web app into Firefox creates a lot of new attack vectors. In my opinion, the potential gain in privacy isn’t worth it and you can achieve better results with uBlock and NextDNS, anyway.
Excluding uBlock, this is the one other extension I had installed for awhile. I like the idea of being able to use privacy respecting front ends, but ultimately deleted it as I didn’t like the list of random instances and didn’t consider it worth the extra fingerprintability. You can always just copy the Reddit or YouTube link and manually change the URL to your preferred Libreddit or Invidious instance. The extra three seconds isn’t that big of a hassle.
Again, this has no privacy/security benefits and is a pure a convenience thing. Is it really worth the extra extension?
Not to keep beating a dead horse, but this also provides zero privacy/security benefits. Skip buttons are wonderful things.
The pinnacle of extensions. It does all you need it to do plus more. If you haven’t done so already, I’d suggest skimming through the wiki to see some of the incredible things it can do. The page on blocking mode might be particularly helpful since a few of your extensions can be eliminated by using a stricter blocking mode.
I’m a bit confused by need the know the location of a given server. The level of detail implies quite a strict a threat model, but I doubt that’s the case based on some of the other extensions. Even so, if your threat model really does call for knowing the locations and details of the servers you interact with, I’d suggest learning how to do that on your own. I can’t provide any resources on how to go this route, but I’m sure someone else here can.
It’s impossible to make Firefox (or any browser) unfingerprintable. See this recent thread on fingerprint protection in Firefox. Fingerprinting websites are pretty much useless for real world applications. I personally wouldn’t lose sleep over 17 bits of data, but if your threat model calls for it, then I’d suggest looking into Tor.