one, SPDY or HTTP2. What is seen on The 2 endpoints is irrelevant, as the purpose of encryption is not to generate points invisible but to produce items only seen to dependable get-togethers. And so the endpoints are implied in the issue and about 2/3 of the solution can be removed. The proxy information needs to be: if you utilize an HTTPS proxy,