one, SPDY or HTTP2. Exactly what is noticeable on The 2 endpoints is irrelevant, since the objective of encryption is just not to make items invisible but to help make items only obvious to dependable get-togethers. Hence the endpoints are implied from the dilemma and about two/3 within your respond to is often taken out. The proxy information and