What are the security implications if any?
"To use your DNIe in your browser you need:
- Install the PKCS#11 Security Module
- Install the Root Certificate of the DNIe Certification Authority"
More info: https://www.dnielectronico.es/PortalDNIe/
Mitigating this, there are mechanisms to keep track of which certificates are used for which websites, so this could catch them in the act.
However, note that "Root CAs manually added to the trust store override and suppress Expect-CT reports/enforcement."
Since this is the Spanish government, it seems likely they will target Catalonia somehow.
Who decides who is a trustworthy issuer?, and why can’t we, users, modify these lists? (At least on iOS)
I think they ought to be setting it for usage for client identification only.
If it's for server identification too, I wouldn't trust it.
Most certificate stores will not allow the import of a certificate that has been signed by a trusted root that it doesn't know about. That is why you're required to import that root cert.
As for what features it states that it supports ... That's another matter entirely!