one, SPDY or HTTP2. What's seen on The 2 endpoints is irrelevant, given that the aim of encryption will not be to make matters invisible but to make issues only visible to reliable functions. And so the endpoints are implied within the issue and about two/three of one's response could be eliminated. The proxy information and facts should be: if you