one, SPDY or HTTP2. Exactly what is visible on the two endpoints is irrelevant, as being the intention of encryption isn't to produce points invisible but to help make points only seen to reliable functions. Hence the endpoints are implied while in the problem and about two/3 of one's reply could be eliminated. The proxy details needs to be: if you