The requirement of the phone not being rooted is another blunder. This is trusted computing against the user in my opinion.
The requirement of the phone not being rooted is another blunder. This is trusted computing against the user in my opinion.