one, SPDY or HTTP2. Precisely what is seen on The 2 endpoints is irrelevant, as being the objective of encryption is not really to create points invisible but to help make things only visible to trusted parties. So the endpoints are implied within the issue and about two/three within your respond to can be eliminated. The proxy details must be: if