You could exploit the low power states maybe. for example you can bypass security processors buy underpower them like in the switch or the exploit that...