one, SPDY or HTTP2. What's seen on The 2 endpoints is irrelevant, because the target of encryption is not to create items invisible but to generate points only seen to reliable functions. Hence the endpoints are implied from the problem and about two/3 of the reply might be taken out. The proxy data really should be: if you employ an HTTPS proxy, t