All of the changes are needed and will be appreciated by any user of TOR. The problem is that most of these fixes deal with userland problems. Hardware or system spec fingerprinting is not an uncommon method for tracking someone through TOR-Land, but as we saw in 2015 it is being replaced by even simpler unmasking techniques. Including one that has been around for quite a while (exit timing).
We had honestly expected TOR to have bundled in a little more traffic obfuscation by now (especially given that they worked on it for a side project). Hiding the traffic type from the client to the entry node can help to limit the exposure to surveillance. Now, if they are already watching your IP then you are pretty much screwed. Between Flow monitoring, packet timing and even policy based routing (to push your traffic to their entry point) you are pretty much screwed.
If you do use TOR then you should go ahead and grab this new release. If not, well here is your chance to try it out. Just remember that nothing will protect you 100%, there are far too many variables out there that can allow a determined (or skilled) hunter to find you and unmask you and; that is just the way it is.