one, SPDY or HTTP2. What's seen on the two endpoints is irrelevant, because the intention of encryption is not really for making items invisible but to create points only obvious to trustworthy events. Therefore the endpoints are implied inside the issue and about two/three of your respective solution is often taken off. The proxy information need