No. It's hardly possible. There are several problems with it.
The main problem with avoiding fingerprinting is that we have very little idea about how it actually works, so we have no idea what to do to circumvent it.
Everybody seems to think of Panopticlick as a reference frame for fingerprinting. And you can, in theory, more or less circumvent Panopticlick by crowdsourcing fingerprints. But Panopticlick is a very limited demo. Its whitepaper clearly states that even in 2009 when Panopticlick was created commercial fingerprinting solutions were much more advanced:
Arcot... claims it is able to ascertain PC clock processor speed, along with
more-common browser factors to help identify a device. 41st Parameter looks
at more than 100 parameters, and at the core of its algorithm is a time differential parameter that measures the time difference between a user's PC (down
to the millisecond) and a server's PC. ThreatMetrix claims that it can detect
irregularities in the TCP/IP stack and can pierce through proxy servers... Iovation provides device tagging (through LSOs) and clientless [ngerprinting],
and is best distinguished by its reputation database, which has data on millions
of PCs.
And this was in 2009! I'm afraid to think what those guys have come up with since then.
The other problem is that if you change your clock skew every so often, you can't check if that helped or not, unless you have access to admin consoles of all major fingerprinting providers.
This is why there are no software to circumvent fingerprinting: nobody really knows how to combat it. So we'll probably have to deal with it.