Statement:
The research paper describes that Bluetooth Low Energy connections managed through `bluetoothctl` control or via D-Bus API are not vulnerable to this attack as they strictly follow the proactive authentication specification. Connections that are managed by `gatttool` are among those that may be vulnerable.
Mitigation:
Bluetooth Low Energy can be disabled altogether if it is not required, using the configuration below. This will prevent BLE devices from connecting with the host, disabling this attack
```ControllerMode=bredr```