There is no impact. The user's CA certificate is just added for packet capture or for someone to access the Internet. After deletion, at most these software cannot be used normally, and there will be no impact on browsing the web, chatting, etc.
In addition, if you delete all system certificates under root, you will continue to report that the webpage is not safe when browsing.
Certificate Principle
The digital certificate appends the user information and the signature of the CA after the user's public key. The public key is one part of the key pair and the other part is the private key. The public key is made public and anyone can use it. Only you know the private key. Information encrypted by a public key can only be decrypted by its corresponding private key. To ensure that only one person can read their message, the sender encrypts the message with the recipient's public key.
The recipient can then use his or her private key to decrypt the message. Likewise, to verify the sender's identity, the sender signs the letter with his or her private key; the recipient can verify the signature using the sender's public key to confirm the sender's identity.
You can use digital certificates to verify the identity of the other party during online transactions. Encrypting information with a digital certificate can ensure that only the recipient can decrypt and read the original text, ensuring the confidentiality and integrity of the information during transmission. With digital certificates, online security can be achieved, and the security of emails, online transactions and credit card purchases can be guaranteed.