05/28/2011, 04:38 AM
Rod Whitby from webOSinternals bought a Veer to analyse the new hardware and test and improve all the hombrew stuff they build.
Unfortunately later on he posted on twitter:
Yep, homebrew apps and patches are still safe, but hard-core command-line
level experimentation will result in a bricked Veer.
So, the bricking of the Veer is related to a PmA6Updater binary on the device.
DO NOT RUN PmA6Updater.
Also stay clear of the PmModem* binaries on the Veer, it is *far* more fragile
than the Pre/Pre+/Pre2 (which are pretty much unbrickable).
There is no danger associated with using Preware or Impostah or any other
released homebrew apps on the Veer.
Please help us and donate
To be very clear, this is a device which was purchased at full price off-contract from an AT&T store.
There are no strings attached to this device. It was not a free or discounted developer device. The device did not come from HP. There is no NDA, embargo, convenant, or other restriction on this device.
It was used to test Preware, Impostah, Govnah, and other homebrew applications for the Veer. All that was very successful, and I can report that all tested homebrew applications and patches ran safely and correctly on the Veer.
Then it was used for further hard-core command-line investigation into the new "tap to share" interface (which seems to be controlled by an "A6" chip). That's when things went wrong, and the device was permanently bricked.
(Follow the link to see some pictures of the internals of a Veer)
You certainly know what the webosinternals team and Rod has done and is still doing for us.