Initialize the SOCKS password to random offset at start
When Tor Browser starts, the SOCKS password is initialized to 0. Each time a new circuit is to be used, it is incremented. Unfortunately, if the browser is restarted, it is reset to 0, and it may cause the browser to re-use the same circuits. This is obviously bad for linkability. A workaround for this would be to randomize the SOCKS password to a random offset when Tor Browser starts up, so it is never initialized with a previously used password and thus previously used circuit.