I don't think you understand the point of the OTP and why it can't be brute forced: for any possible output, there is a corresponding one-time key. So you have no way to tell if the key you have come up with is correct, you can 'decrypt' an OTP ciphertext into a coherent sentence saying whatever you want in any language you want (the only constraint being maximum length), and bruteforcing will just give you all of them.
oh i get it, the frequency of use is what allows frequency analysis.
use a pad once then rotate to a new pad. [effectively re-key the encryption]
avoid using characters in high frequency [vowels, language specific phonemes]
use alternate misspellings, intentional typos.
keep the message very brief, the longer the message the more effective frequency analysis becomes.
try to avoid corelative events.
if every time a cypher that looks like [abc] is captured, somthing, is bombed, or major troop movements occur, you have an idea what the message is about, giving a bit more leverage.
also standard OTP pads use 2 axis, a tensor matrix is a better OTP.