1, SPDY or HTTP2. What exactly is visible on The 2 endpoints is irrelevant, since the intention of encryption is not really to generate issues invisible but to generate items only seen to trusted get-togethers. So the endpoints are implied inside the concern and about two/three within your remedy may be taken off. The proxy information and facts mu