Recommended mitigations for traffic analysis attacks?

In the Tor blog post "New low cost traffic analysis attacks and mitigations " (New low cost traffic analysis attacks and mitigations | The Tor Project), the advice is given to users to “Do multiple things at once with your Tor client”. Presumably some types of traffic are better than others - for example, simply opening some extra tabs won’t generate much traffic after the initial load (with the exception of buffering video etc.).

Do you have recommendations for how to ideally randomize traffic? Ideally there would be options from Tor Browser, but for users comfortable with the CLI, maybe a script exists designed for this, using torsocks?

A script would have the benefit that it could be run by default on anonymity focused distributions like Tails and Whonix, so users would be protected without requiring specific behavior from them.