Neither one of them are adequate for protection from government access and neither one of them should be used for such a purpose.
The value of disk encryption is to keep the data secure in the event of a lost or stolen system.
Government agencies such as . . . have other means of obtaining the data. For instance a "back door", malware, etc. while the system is online, or detain and coerce for pass code. Unless a person has content worth going to prison over and/or enduring a tremendous amount of coercion to protect, most will give it up in a heartbeat.
Both are probably adequate for their intended purpose.
I like BitLocker myself. Not having to enter a password to unlock the disk is typically due to the use of a TPM. In such a case any default/standard user account names should be disabled or renamed and accounts should be locked for some extended period of time after n failed login attempts. And it should be needless to say that passwords should be reasonably difficult to guess, both manually and via automation.--
Be a Good Netizen - Read, Know & Complain About Overly Restrictive Tyrannical ISP ToS & AUP »comcast.net/terms/ »verizon.net/policies/
Say Thanks with a Tool Points Donation