From the MajorGeeks article:
"There is no version number yet. It is considered early development
but as far as we can tell, it's stable and bug-free. It should be
regarded as an alpha build for now."
In QA testing, even alpha versions get version numbers, so this tool
should be considered pre-alpha quality; i.e., highly experimental. For
now, they just using datestamps to identify code branches. There isn't
much activity going on considering this is a pre-alpha quality tool.
One date tag is May 2020 and the second is Jun 2021. That's a year
apart between code branches.
There are hidden functions inside of Windows regarding the creation of
policies that are assigned a hash via the crypto API that gpedit.msc
will call. I haven't deeply delved into how this hash is created to
know how it works, like how the hash is generated. For example, when
defining SRPs (Software Restriction Policies), you cannot simply use
regedit.exe to define them.
https://docs.microsoft.com/en-us/windows-server/identity/software-restriction-policies/software-restriction-policies
You can try to define SRPs using regedit.exe, or some 3rd party tool,
but you won't be able to define the safety hash that gets assigned to
them to prevent malware from doing exactly what you are doing with the
registry editor, or via .reg files to apply registry changes. An SRP is
protected from unauthorized modification by having a hash that only
Windows knows to define in cooperation with the Microsoft-based policy
editor. SRPs are very handy to allow/block an application from loading.
Think of them like application firewalls: instead of blocking
connections, SRPs decide whether to allow or block loading of apps. For
example, some apps cannot have their outbound connections blocked to
prevent automatic updating, because that would impact or nullify the
purpose of a web-centric app. If they use a separate updater program,
you could block that from loading.
This is similar to protected filetype definitions. Some get a
UserChoice registry entry that has a hash value that only Windows can
generated by using the Default App wizard. You cannot create the crypto
key yourself (it will be invalid). You cannot copy the UserChoice entry
into the registry (the hash won't be valid). This is to prevent
malware, or rudeware, from altering the filetype definitions without
your authorization. While filetypes just get a hash value assigned to
them, as I recall the SRP entries themselves are crypto scrambled. When
you define them in the policy editor, looking at them using regedit.exe
show the data item values are encrypted. I don't have a Pro host to
check if my recollection is correct. There are crypto entries that
regedit.exe won't show you no matter how many permissions you have.
It's a user-mode viewing tool, as would be any 3rd-party tool. As a
user, even as an Administrator, you don't get to see everything in the
registry.
There are lots of non-protected registry entries, so using regedit.exe,
reg.exe files, or 3rd-party tools will work for most policies. All
policies are registry entries, but some of those are crypto protected,
and only Microsoft's policy editor along with keys embedded in Windows
can assign the proper hashing to a policy entry, or other protected
entries. I search their Issue records, and nothing shows up regarding
crypto protection, or even for hash data values assigned to entries.