one, SPDY or HTTP2. Exactly what is noticeable on the two endpoints is irrelevant, as being the goal of encryption isn't to produce points invisible but to help make matters only obvious to dependable get-togethers. Hence the endpoints are implied from the problem and about two/3 of one's reply could be taken out. The proxy details must be: if you