Is there any security lost by restoring your Trezor using the recovery seed? I ask this because you have to type in the recovery seed on the computer. I know it is in a different order, but say if you had a keylogger, how much would this increase the chance of someone guessing your recovery seed, since they would know the words?
The number of combinations with a 24 word seed after each word is known but the ranking is not, is:
24! ~ 6.2 × 10^23
You need to put this into perspective. When using 24 words, the Trezor seed is 256bit long, i.e., 1E77. Any single address generated is 160bit long, i.e., 1E48. Those are some huge numbers. 1E23 is child's play compared to that. If the number of combinations is 1E77 before you keylog the words and it becomes 1E23 after you keylog them, then the recovered Trezor is 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 times less secure then the unrecovered one. Please note that Trezor uses key stretching techniques, so to find whether the 24 words that have been keylogged contain(ed) some BTC, you need to do more than 10^23 hashes. It should be something like 10^28. But there is also 10^13 Hash/s hardware out there. If something like that was manufactured for Trezor breaking then you would need 10^8 of those to break one recovered Trezor in a year time. I guess that considering price of such equipment and the possibility you break an empty(emptied) Trezor rules out such attack (for now). I would still recommend to transfer your funds to unrecovered Trezor after recovery to get 1E77 protection back. I would also not recommend using less than 24 words.