I can see how option #4 is a problem from a theoretical standpoint, I still have trouble imagining an actual attack.
* Earnings projections (and in general slides from non-public presentations that the user but not the attacking website has access to)
* Medical imaging
That's after thinking about this for 15 seconds. I'm sure there are many more in practice.
Or is that not what you were asking?
I can see how option #4 is a problem from a theoretical standpoint, I still have trouble imagining an actual attack.