

It won’t refuse to boot. It’s just that any automatic metric based decryption won’t work.
If you are using a TPM to automatically unlock luks and also manually removed the password backup before hand you could lose your data forever. That is true.
But if you kept the password based decryption stuff you could still manually unlock stuff. Just like secure boot was never there.
The difference would be that there could be no secure attestation that the kernel count trust/use without secure boot.
Like secure boot is really cool on Linux if you learn about it. Like sbctl alone is great for verifying backups and stuff.
I recommend reading through the arch wiki if you want to learn more. It covers a lot of stuff. https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot
Exactly this. The people who designed secure boot and TPMs were not idiots. You can’t trick a properly set up TPM configured with secure boot in any realistic setup.