one, SPDY or HTTP2. Exactly what is noticeable on the two endpoints is irrelevant, as being the target of encryption is not to create items invisible but to generate points only obvious to trustworthy functions. Hence the endpoints are implied while in the problem and about two/3 of one's reply could be eliminated. The proxy details needs to be: if