I think this take is starting to be a bit outdated. There have been numerous films to use Blender. The “biggest” recent one is RRR - https://www.blender.org/user-stories/visual-effects-for-the-indian-blockbuster-rrr/
Man in the High Castle is also another notable “professional” example - https://www.blender.org/user-stories/visual-effects-for-the-man-in-the-high-castle/
It’s been slow, but Blender is starting to break into the larger industry. With bigger productions tending to come from non-U.S. producers.
There is something to be said about the tooling exclusivity in U.S. studios and backroom deals. But ultimately money talks and Autodesk only has so much money to secure those rights and studios only have so much money to spend on licensing.
I’ve been following blender since 2008 - what we have now is unimaginable in comparison to then. Real commercial viability has been reached (as a tool). What stands in the way now is a combination of entrenched interests and money. Intel shows how that’s a tenuous market position at best, and actively self destructive at worst.
Ultimately I think your claim that it’s not used by real studios is patently and proveably false. But I will concede that it’s still an uphill battle and moneyed interests are almost impossible to defeat. They typically need to defeat themselves first sorta like Intel did.




Don’t know why the other poster is giving you such grief there. It’s important to note that when you encrypt your root partition that you can’t view it from refind. It doesn’t have a mechanism to decrypt the contents it finds.
The way to address this is to ensure that you’re using a Unified Kernel Image. Essentially, a full image of your Linux boot image that lives on your EFI partition. Keep in mind it can’t get to your personal data until it decrypts your root disk, but at least you can get things booting.
So, you should take the time to switch to a UKI boot process.
I recommend disabling secure Boot and encryption first and Getting the UKI Boot working through refind. Then add secure boot using sbctl. Then re-encrypt your discs. Since secure boot is all set up at this point, you should be able to back your decryption with your systems TPM chip.
Here’s the page on unified kernel images.
https://wiki.archlinux.org/title/Unified_kernel_image