Figure 5
From: Feasible attack on detector-device-independent quantum key distribution

Schematics of hacking scheme. Eve consists of copies of Alice (Alice’) and Bob (Bob’), which share bit and basis settings and a blinding laser. C: optical coupler.