one, SPDY or HTTP2. Exactly what is visible on the two endpoints is irrelevant, since the target of encryption is not to create items invisible but to generate factors only seen to trustworthy events. Therefore the endpoints are implied inside the issue and about 2/three within your respond to can be eradicated. The proxy information really should