Out of interest, how could this apply to legitimate requirements for gaining root access? For example, in order to use the Citrix client for work purposes on my tablet I was advised to follow this: http://wiki.cacert.org/ImportRootCert#Android_Phones I'm sure there are other examples