As others have pointed out above and before: Passphrases are neat and easy to remember --- but a nightmare to type.
There is no functional difference between typing X letters of a word, or X letters of random garbage once memorized. Indeed, I would rather argue that the (almost) random garbage is probably faster, since you could choose it for maximum typing comfort/speed, like more strongly alternating hands for typing and avoiding "distant" key combos, without greatly compromising entropy.
Now, add to this that words in almost all languages follow a nice pattern: Consonants-Vocal-Consonants-Vocal. Usually with a 1.5:1 ratio of consonants to vocals. So your actual entropy for pure word-length compresses down by a similar factor.
So, in difficulty of brute forcing (if the attacker knows you chose either garbage or words) 10 letters of random garbage equal about 15 letters of regular words; give or take a few characters.Add to that the speed argument above, once you've memorized them
This means that a passphrase gets more secure only after it has already become far more time consuming to type.
Finally, at some point (currently at about 10-16 chars, depending on the algorith), it becomes easier to break the password hashes by finding collisions that to brute-force the password.
So congrats for your passphrase having 2000 bits of entropy, when it still only takes 15 minutes to find a SHA1 collision against your password.