The requirement of the phone not being rooted is another blunder. This is trusted computing against the user in my opinion.