one, SPDY or HTTP2. Exactly what is noticeable on the two endpoints is irrelevant, given that the objective of encryption is just not for making matters invisible but to make issues only noticeable to trustworthy events. So the endpoints are implied in the query and about 2/three within your respond to can be removed. The proxy information ought to