Hi.
1 Classic TPM sniffing is impossible if you use a firmware based TPM ("fTPM"). Most devices manufactured after the release of Win10 (2015) are equipped with an fTPM, so the point is moot for, say, >90% of modern machines unless you have other reasons not to use an fTPM. There are still attack vectors left, see https://ieeexplore.ieee.org/document/10190531
2 In my opinion: "who uses a passphrase!?". If you want highest security, you use a certificate or the TPM or a usb-based .bek file ("startup key protector") as protector, never a passphrase. If we are talking about a non-OS partition, you could also use the auto-unlock protector so d: "piggy-backs" on the strong protector that you set for c: and no additional entry is needed.