The attack requires floor(log2(id))+1 redirects where id is a numerical identifier.
They have a chart here which expresses the feasibility in terms of how many seconds it takes to perform the redirects required for generating ids in ranges of a certain size.
If someone were to use this attack at scale, they would probably pair it with some other kind of browser fingerprinting, because this is basically another, expensive but precise, method of fingerprinting.
If your browser redirects you more than a few times when you visit a website, I don't know what would make you stay/return.
floor(log2(id))+1redirects whereidis a numerical identifier.