1, SPDY or HTTP2. Precisely what is visible on the two endpoints is irrelevant, since the intention of encryption isn't to produce points invisible but to create items only seen to dependable get-togethers. And so the endpoints are implied in the question and about 2/three of your respective answer might be eradicated. The proxy info must be: if yo