In Gaussian quantum key distribution eavesdropping attacks are conventionally modeled through the universal entangling cloner scheme. which is based on the premise that the whole environment is under control of the adversary. i. e. https://www.roneverhart.com/Lycogel-Breathable-Concealer/