Text this: Snapshot Cherry-Picking Attack in CEX Proof of Reserves and its Mitigation