Bear in mind that security doesn't comes canned (metaphorically). You can use
scripts to automate part of the process of securing a system, but you
shouldn't rely on them to “harden” or whatever it claims to do if you
don't understand what they do or why you would need such a thing. The Tor
projects warns against the mistake of thinking of security as something that
comes canned; see their warning at the download page.
Taking a look at the “What this does” section, the script you mention
seems quite worthless. It doesn't seem to do anything that wouldn't be better
done manually by the user according to his situation. It seems to be is
lacking a license, therefore it is proprietary software. Also, it installs
TrueCrypt which has been discontinued and it has never been free software
(See Various Licenses and Comments about Them § TrueCrypt). It also installs
Chrome which is not free software, see section 9.2 from their terms of
service. Chromium apparently has licensing problems as well, but I haven't
investigated further because I'm not interested in having any association
with Google.
If you are interested in having a secure system, make sure to research
everything you install. It's not practical to audit your system (tens of
millions of lines of code), but you can check basic information before
installing, such as licensing. In this case, doing so would have revealed the
problems that I mentioned above. Also, you can read books about security.
Don't take advice or install software without knowing what it entails for and
knowing why it would benefit your security.