Been doing a lot of reading on Linux encryption techniques, and one that I've come across is encrypting the /boot directory by keeping it on the same partition as the root. I recall reading somewhere that if you encrypted your /boot, you would need to modify GRUB or something every time your system updated. Can't remember where I read that, so not 100% sure if it's true or not. Are there any other disadvantages of having /boot encrypted?
Currently, at least on OpenSuse Tumbleweed, you're required to enter the LUKS password twice: once to decrypt /boot and once to decrypt your other partitions (assuming you use the same password for all partitions).
In the early unlock, Grub2 also defaults to a US English keyboard layout, so you can't type in Dvorak or German or whatever your normal layout may be. Customizing that layout seems to involve a bit of work.
With systemd-boot on Pop_OS, you only need to enter the LUKS password once with an encrypted /boot.