one, SPDY or HTTP2. What exactly is visible on The 2 endpoints is irrelevant, because the goal of encryption is not really to generate issues invisible but to help make factors only visible to reliable parties. Therefore the endpoints are implied during the issue and about two/three within your solution might be taken off. The proxy information mus