one, SPDY or HTTP2. Exactly what is noticeable on The 2 endpoints is irrelevant, as being the objective of encryption is just not to help make items invisible but to make issues only noticeable to trustworthy events. Therefore the endpoints are implied from the dilemma and about two/three within your response may be taken out. The proxy details nee