one, SPDY or HTTP2. Exactly what is noticeable on the two endpoints is irrelevant, as being the intention of encryption isn't to generate points invisible but to help make things only visible to trusted parties. And so the endpoints are implied in the question and about 2/three within your respond to can be removed. The proxy information ought to b