one, SPDY or HTTP2. What's obvious on The 2 endpoints is irrelevant, as being the goal of encryption is not for making matters invisible but to produce issues only noticeable to reliable get-togethers. So the endpoints are implied in the problem and about 2/three of your respective respond to could be taken out. The proxy info need to be: if you ut