1, SPDY or HTTP2. What is noticeable on the two endpoints is irrelevant, given that the target of encryption is just not to produce matters invisible but to produce issues only noticeable to dependable parties. Hence the endpoints are implied within the dilemma and about two/three of your respective respond to might be taken off. The proxy facts ne