Attacking the password is only possible in one of these cases, while other protectors require a very different set of attacks. BitLocker volumes may be protected with one or more protectors such as the hardware-bound TPM, user-selectable password, USB key, or combination thereof. BitLocker is well-studied and extensively documented solution with few known vulnerabilities and a limited number of possible vectors of attack.
BitLocker is one of the most advanced and most commonly used volume encryption solutions.