What remediations are provided for a BlueBorne attack or vulnerability? Follow