one, SPDY or HTTP2. Precisely what is visible on the two endpoints is irrelevant, given that the aim of encryption is not really to produce points invisible but to make issues only seen to dependable functions. Therefore the endpoints are implied during the question and about two/3 of one's respond to may be taken off. The proxy information and fac