one, SPDY or HTTP2. What is noticeable on the two endpoints is irrelevant, as being the goal of encryption just isn't to generate points invisible but to help make factors only seen to reliable functions. Hence the endpoints are implied while in the concern and about 2/3 of one's solution may be eliminated. The proxy info ought to be: if you use an