It doesn't say that either. It talks about the inability to clear keys from RAM and why you should wait several minutes before considering the computer secure to an attack that can read RAM from a powered-off(!) computer. The "missing APIs" require Truecrypt to keep the system volume mounted during shut down, and while mounted, the keys must be in RAM. Again, they're providing the type of exhaustive documentation Microsoft never does, and it's all in the interest of disclosure; unfortunately, it seems to create a lot of confusion. This is nothing to worry about.(2) Per the documentation, TC does not know how to handle a system drive on shutdown or hibernation. There is no API for it. See page 89 of the manual.
I don't know any way around that, but it's been a couple of years since I encrypted my system drives, and I don't remember much about it.(3) TC requires creating a recovery CD/DVD. My computers don't have a CD-ROM. Creating a recovery USB drive is a hassle at best.
None of the several Asus and Gigabyte motherboards I've bought have one, very few of them that are available at places like Newegg seem to have them, and my Dell Vostro laptop from 2008 or so doesn't have one. I've personally never seen a computer that has one. Then again, I just found some articles claiming 100,000,000 computers have TPM chips in them, so what do I know?I haven't investigated Bitlocker yet, but using a pin as a pasphrase is ridiculous. Then again a pin + USB drive as a TPM might work. Are you sure that a TPM computer is rare? I thought that most modern computers have it.