Here is an article that explains the technical bit of it all https://support.sectigo.com/articles...Cu8HTFL5qQr00I If you read towards the end, you will see that the roots are present in many devices. The list there gives you the names of all operating systems where they were added. So it is safe