one, SPDY or HTTP2. Exactly what is visible on The 2 endpoints is irrelevant, as the purpose of encryption is not to make items invisible but to help make points only obvious to trustworthy parties. And so the endpoints are implied inside the concern and about two/3 of your respective answer can be eradicated. The proxy info really should be: if yo