that’s a good attempt at being helpful, yet it’s not. The LUKS decryption was never a problem for me, because I don’t use it(!), yet putting new operating system(s) has been problematic. Since the world moved to x86_64 OSes, both proprietary software and FOSS have converged on UEFI. Even Apple! I’ve done a few hackintoshes and learned more about EFI than I wanted to know, firs through rEFIt and then the delightful rEFInd from Rod Smith. Anyways, nearly all x86_64 bit OSes, not just linux, expect the user to be dealing with EFI, even if just erasing it. Often there’s options to use MBR and not GPT, but pretty much all recent linux distro intros, assume the user has Windows 10, and therefore has EFI partition booting on their PC, even if they are not aware of it. Not using EFI; instead using the linux distro HEADS as a replacement for EFI software, and also with each new install: resetting the TPM pwds, generating a new TOTP / HOTP secret, and updating the checksums (all of which I’ve done several times more than I desired). That’s confusing and frustrating. I don’t see anywhere in the previous posts any problem with LUKS. Nice guess that it might be a problem, but there’s no reason to think it is (four months after the actual posts and questions!) Sorry, I just couldn’t let this thread end like that. Also, I want to say, I’d rather see Librem tackle UEFI security, instead of using HEADS and/or seaBIOS. It was a difficult transition to EFI, and for multibooting, GRUB 2 isn’t the most elegant solution (maybe you remember legacy GRUB, LILO, even BURG). I understand there are security issues, but can’t we come up with at least a pseudo-UEFI boot? Especially that noobies can use when installing a different OS? Something that displays information maybe when a Linux EFI distro is booted from USB?