one, SPDY or HTTP2. What is noticeable on the two endpoints is irrelevant, as being the objective of encryption isn't to produce points invisible but to help make things only visible to trusted parties. So the endpoints are implied in the question and about 2/three of your respective respond to is usually eradicated. The proxy information and facts