This document discusses the exploitation of TCP timestamps over time. It begins with an overview of what TCP timestamps are and their intended purpose. It then discusses various attacks that have exploited TCP timestamps to determine host uptime, identify hosts, gather network layout information, reveal hidden services, and improve OS fingerprinting. Many proposed mitigations have been shown to still be exploitable. The document argues that while solutions have been proposed, the problem has not been fully addressed. It concludes by calling for further good solutions and discussion on how to properly address the issue.