1, SPDY or HTTP2. What is seen on the two endpoints is irrelevant, as being the goal of encryption isn't to generate points invisible but to help make things only visible to trusted parties. So the endpoints are implied in the question and about 2/three within your respond to is usually eradicated. The proxy information and facts should be: if you