[Author here]
> Isn't this fairly common in Linux-land,
I am not sure what you mean. You are responding to a negative statement with a positive statement and I can't tell what you are asking.
Isn't _what_ fairly common?
Currently, without disk encryption, it is common to be able to move a disk from 1 PC to another and have it work, yes.
Will this scheme prevent that? Yes. That is its purpose.
Is there a way around it? No. That it its purpose: to prevent you extracting a disk from a machine and getting at the contents. This is not merely by design, it is the reason for doing it.
Is there a fallback? No, not that I know of. Ask them.
With the MS scheme it is possible, if you have the machine and it still works and if you have the keys and access to the MS cloud account that created it, to recover a locked disk, in the same machine. You can unlock it and get at the data, or even relock it again and carry on as before. I've done it.
if you do not have the machine, no. If the motherboard failed, say, and you want to rescue the data... tough.
What should be possible is to nuke the encrypted volume, and either recreate new volumes and install a new unencrypted OS, or create a fresh new encrypted disk, but losing all the old data.