Maybe the fact that you received the broadcast should be.
Slowing down anyone who wants to build a massive database about you to identify your weaknesses, this is a good thing to do.
Edit:
I love being modded down by people who don't reply with evidence based argument, it's better than fake internet points to let you know you're onto something. /me waves to our visitors from the NSA.
For example, a network adversary can make a list of everyone who was interested in Apple's government data access policy. They can also tell which of those people accessed that policy from an Apple device, thanks to unencrypted user-agents. One practical use of that might be in planning future investigations.
More generally, there was the report of an XKeyScore rule to identify people who were interested in Tails. It's hard to know what a particular network adversary uses that information for, but it's disquieting to think that, partly because information about OSes, privacy policies, and communications security measures is served up unencrypted, it's possible to profile people based on their platforms (or intended future platforms), interest in particular aspects of privacy and security, and technical sophistication.
Because of TCP fingerprinting and unique file sizes, as well as sites that have information only or mainly about a single topic, it may be hard to fix this problem with HTTPS alone. But it's important to think of the fact that someone read something as privacy-sensitive even when the thing they read is available to the public. If you don't care for the communications security examples or they just strike you as too meta, try browsing around WebMD for a bit. Nothing there is secret or even customized for any particular user!