“…The process assumes a perfect cloning device capable of cloning and maintaining all the characteristics and properties of that specific polarized photon, even though they are affected by the fidelity of the equipment used. Relative attacks such as beam-splitting [34][35][36] have been a platform for daisy chaining other exploratory exploitations, such as calibration attacks [37,38], side-channel attacks [39][40][41], which extend wavelength manipulation [42,43] with a similar profile attack, such as detector-deviceindependent [44], denial of service attack [45,46], intercept-resend attack [47], and Trojan horse attack [48].…”