

I don’t, because I have better control over my disks. With TPM, the keys are stored within the chip itself, and I won’t be able to unlock it if I boot into another OS (re-installing, dual boot, etc). With password, while inconvenient, I know that I can always unlock it, ans the chance of locking myself out is negligible.
TPM being a backdoor doesn’t seem likely to me. Worst case scenario, transparent mode is just as bad as unencrypted disk.
Reason since it’s not mentioned in the title: