one, SPDY or HTTP2. What exactly is noticeable on the two endpoints is irrelevant, since the goal of encryption is just not to make factors invisible but to make factors only noticeable to dependable parties. Therefore the endpoints are implied within the problem and about two/three of your respective reply may be eradicated. The proxy information