I've seen similar "bypasses" in the wild. In overall (including this one), they only work if :
DTP is not running, and in this case, they can only get the token through social engineering (making you relogin without DTP). The config changes are useless as these critical configs have been moved to the encrypted container.
If they run using admin privilege. If you allow a program to run using admin privilege you can safely assume that your token can be easily compromised. DTP cannot block attacks with admin privilege since it is in user land.
In this case, the config change, even if successful, won't do anything.
GLHF