

Don’t know why the other poster is giving you such grief there. It’s important to note that when you encrypt your root partition that you can’t view it from refind. It doesn’t have a mechanism to decrypt the contents it finds.
The way to address this is to ensure that you’re using a Unified Kernel Image. Essentially, a full image of your Linux boot image that lives on your EFI partition. Keep in mind it can’t get to your personal data until it decrypts your root disk, but at least you can get things booting.
So, you should take the time to switch to a UKI boot process.
I recommend disabling secure Boot and encryption first and Getting the UKI Boot working through refind. Then add secure boot using sbctl. Then re-encrypt your discs. Since secure boot is all set up at this point, you should be able to back your decryption with your systems TPM chip.
Here’s the page on unified kernel images.
Hi! This is what I’m trying to do with tucson.social. Wish the city would get back to me. I don’t want to own/operate Tucson.social alone perpetually. Lol.
It would allow me to expand to a lot more community services outside of social media, chat, and Meetup platforms.
There’s dozens of us! Dozens!