Final Words
With any luck, if you've followed this guide you should now have a working Arch Linux system with a fully-encrypted hard drive. Additionally, your computer should be able to decrypt the drive automatically using a cryptographic key that is saved in your TPM2 module.
Enjoy the system! And if you'd prefer something other than Arch Linux, I hope that these instructions have still given you enough insight that you can configure your system of choice.
Disclaimer
This information is provided without any warranty express or implied. Follow these instructions at your own risk.
Copyright notice
While I am the creator of this document, I do not claim any copyright over it. It is officially released into the public domain for you to use as you wish.