What Is a Root Certificate and How Can It Be Used to Spy on You?