Very interesting video. Is far as I can see, there are really only three points of weakness that were exploited by the chain analysis. The first was if the transaction was started using one of their Monero nodes. The second was exchanges or partner services. The third was the fee structure used. So as long as you use the default fees, use trusted Monero nodes (especially your own), and you either don't use exchanges/partner services or at the very least, have multiple wallets where each wallet connects to at most one exchange/service (i.e. one wallet has public money inflows from a single service and another has public money outflows from a single service), it would be virtually impossible to have your transactions traced.
do not trust random nodes, go and host your own (locally or not) -> to prevent them from logging ip addresses and to deanonymize on the IP level (attacking dandelion from what i understand ?)
if you do end up using a remote node, connect to it through tor to maintain anonymity