"suggest a simple solution to this problem that does not involve the use of timestamps and show how would your solution solve this impersonating attack"